203 posts were published in the last hour
- 22:36 : Hacking conference Def Con bans three people linked to Epstein
- 22:36 : French Ministry confirms data access to 1.2 Million bank accounts
- 22:36 : Why are cybersecurity professionals confident in Agentic AI defenses?
- 22:36 : What techniques in NHI management offer maximum reassurance?
- 22:36 : How is secrets sprawl management getting better with AI?
- 22:36 : Are cloud environments truly protected by NHIs?
- 22:11 : Figure Breach Enters New Phase After Data Leak Claims
- 21:32 : Palo Alto Networks Moves to Secure Agentic Endpoints with Koi Deal
- 21:31 : Moltbook is Dangerous, but Scale Doesn’t Match the Hype: Zenity
- 21:11 : Zero-Day in Dell RecoverPoint Enables GRIMBOLT Backdoor
- 21:11 : ShinyHunters allegedly drove off with 1.7M CarGurus records
- 20:34 : Notepad++ patches flaw used to hijack update system
- 20:34 : Fake CAPTCHA (ClickFix) Attack Chain Leads to Enterprise‑Wide Malware Infection in Organisations
- 20:34 : Critical Ivanti EPMM Zero-Day Vulnerabilities Exploited in The Wild Targeting Corporate Networks
- 20:34 : Cryptocurrency Scams Target Asia, Combining Malvertising and Pig Butchering with Losses Up to ¥10 Million
- 20:34 : NDSS 2025 – Try to Poison My Deep Learning Data? Nowhere To Hide Your Trajectory Spectrum!
- 20:34 : Microsoft Patches Security Flaw That Exposed Confidential Emails to AI
- 20:5 : IT Security News Hourly Summary 2026-02-18 21h : 4 posts
- 19:34 : The Lock, Not the Alarm: How Palo Alto’s Koi Acquisition Rewrites Endpoint Security
- 19:22 : How to evaluate NGFW products to strengthen cybersecurity
- 19:22 : XSS Bug in VS Code Extension Exposed Local Files
- 19:22 : CISA Adds Two Known Exploited Vulnerabilities to Catalog
- 18:37 : From Clawdbot to OpenClaw: Practical Lessons in Building Secure Agents
- 18:36 : Why CEOs’ AI Hype Really Isn’t Landing with Employees
- 18:36 : Firebase Misconfiguration Exposes 300M Messages From Chat & Ask AI Users
- 18:36 : Fraudster hacked hotel system, paid 1 cent for luxury rooms, Spanish cops say
- 18:36 : Data breach at fintech giant Figure affects close to a million customers
- 18:36 : Malware Campaign Delivers Remote Access Backdoor and Fake MetaMask Wallet to Steal Cryptocurrency Funds
- 18:36 : Microsoft 365 Exchange URL Filtering Update Quarantines Legitimate Emails as Phishing
- 18:36 : Microsoft 365 Copilot Flaw Allows AI Assistant to Summarize Sensitive Emails
- 18:36 : ClickFix Abuses Legitimate Homebrew Workflow to Deploy Cuckoo Stealer on macOS for Credential Harvesting
- 18:36 : Randall Munroe’s XKCD ‘Cost Savings’
- 18:23 : 5 Essential Internet Security Tips Everyone Should Know
- 18:23 : From On-Call to On-Guard: Hardening Incident Response Against Security-Driven Outages
- 18:23 : Deutsche Bahn back on track after DDoS yanks the brakes
- 18:22 : Booking.com Phishing Campaign Hijacks Hotel Accounts to Defraud Guests
- 18:22 : Cybercrime Goes Corporate: Huntress Report Reveals Rise of Scalable, Stealth-First Attacks
- 18:22 : Texas sues TP-Link over China links and security vulnerabilities
- 18:22 : Engineering for the Inevitable: Managing Downstream Failures in Security Data Pipelines
- 18:22 : Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
- 17:32 : A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft
- 17:32 : Conduent Data Breach Expands to Tens of Millions of Americans
- 17:22 : Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads
- 17:22 : How to Build Permission-Aware Retrieval That Doesn’t Leak Across Teams
- 17:22 : Betterment data breach might be worse than we thought
- 17:22 : Substack Breach May Have Leaked Nearly 700,000 User Details Online
- 17:22 : German train line back on track after DDoS yanks the brakes
- 17:22 : London Boroughs Struggle to Restore Services After November Cyber Attack
- 17:22 : ISPsystem VMs Hijacked for Silent Ransomware Distribution
- 17:22 : Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution
- 17:22 : Identity and supply chain need more attention, risk intelligence firm says
- 17:5 : IT Security News Hourly Summary 2026-02-18 18h : 11 posts
- 16:36 : Cyber Risk Is a Board Responsibility and Training Is the Missing Link
- 16:36 : ClawHavoc Poisoned OpenClaw’s ClawHub with 1,184 Malicious Skills, Enabling Data Theft and Backdoor Access
- 16:36 : OpenClaw AI Framework v2026.2.17 Released with Anthropic Model Support and Security Fixes
- 16:36 : New SysUpdate Variant Malware Discovered and Tool Developed to Decrypt Encrypted Linux C2 Traffic
- 16:36 : How synthetic data can help solve AI’s data crisis
- 16:36 : SRE Playbook: A Guide to Discover and Catalog Non-Human Identities (NHI)
- 16:36 : NDSS 2025 – CLIBE: Detecting Dynamic Backdoors In Transformer-based NLP Models
- 16:36 : Threat groups using AI to speed up and scale cyberattacks
- 16:13 : Windows Admin Center Flaw Opens Door to Privilege Escalation
- 16:13 : New Keenadu Android Malware Found on Thousands of Devices
- 16:13 : Cryptojacking Campaign Exploits Driver to Boost Monero Mining
- 15:34 : This former Microsoft PM thinks she can unseat CyberArk in 18 months
- 15:34 : VS Code extensions with 125M+ installs expose users to cyberattacks
- 15:34 : Cyber Briefing: 2026.02.18
- 15:16 : Microsoft says Office bug exposed customers’ confidential emails to Copilot AI
- 15:16 : Cogent Security Raises $42 Million for AI-Driven Vulnerability Management
- 15:16 : Securonix shifts security operations to measurable AI-driven productivity
- 15:16 : Microsoft Edge 145 lands with major enterprise security upgrades
- 15:16 : Brinqa targets manual bottlenecks in exposure management with integrated AI agents
- 15:15 : China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
- 15:15 : AI Assistants Used as Covert Command-and-Control Relays
- 14:37 : Paloalto to Acquire Koi Security for Establishing Agentic Endpoint security
- 14:37 : MetaMask Users Targeted with Phishing Emails Containing Forged Security Report to Evade Detection
- 14:37 : 16 Zero-Day Vulnerabilities in Popular PDF Platforms Enable Code Execution and Data Exfiltration
- 14:36 : Sumo Logic Extends AWS Data Center Reach to Europe
- 14:36 : DavaIndia Pharmacy Data Breach
- 14:36 : Figure Discloses Phishing Data Breach
- 14:36 : Man Arrested Over Police Data Leak
- 14:36 : Luxury Brands Fined $25M In Korea
- 14:36 : EU Parliament Blocks AI Tools
- 14:11 : Two Types of Threat Intelligence That Make Security Work
- 14:11 : Your AI-generated password isn’t random, it just looks that way
- 14:11 : Securing OpenClaw Against”ClawHavoc”
- 14:11 : Cryptocurrency Market Slump Deepens Amid Global Tech Selloff and Risk-Off Sentiment
- 14:11 : India Sees Rising Push for Limits on Children’s Social Media Access
- 14:11 : Cloud Range launches AI Validation Range to safely test and secure AI before deployment
- 14:11 : The era of the Digital Parasite: Why stealth has replaced ransomware
- 14:5 : IT Security News Hourly Summary 2026-02-18 15h : 11 posts
- 13:32 : OpenClaw AI Framework v2026.2.17 Adds Anthropic Model Support Amid Credential Theft Bug Concerns
- 13:32 : Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration
- 13:32 : OVHcloud DNS Integration: Simplify DMARC Deployment Across All Your Domains
- 13:32 : Scammers exploit trust in Atlassian Jira to target organizations
- 13:32 : Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability
- 13:32 : Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs
- 13:31 : youX Confirms Major Data Breach
- 13:22 : Cryptocurrency Scams in Asia Combine Malvertising and Pig Butchering, Causing Losses Up to ¥10 Million
- 13:22 : Notepad++ declares hardened update process ‘effectively unexploitable’
- 13:22 : Job scam uses fake Google Forms site to harvest Google logins
- 13:22 : OpenSSL 4.0 Alpha Repository Freeze Approaching
- 12:34 : Critical Ivanti EPMM Zero-Day Vulnerabilities Exploited in the Wild, Targeting Corporate Networks
- 12:34 : China-linked APT weaponized Dell RecoverPoint zero-day since 2024
- 12:34 : AI Found Twelve New Vulnerabilities in OpenSSL
- 12:34 : Single-Character Typo of “&” Instead of “|” Leads to 0-Day RCE in Firefox
- 12:34 : CISA Adds Windows Video ActiveX Control RCE Flaw to KEV Catalog Following Active Exploitation
- 12:34 : Anthropic Releases Claude Sonnet 4.6 with Improved Coding, Computer Use, and 1M Token Context Window
- 12:34 : You can jailbreak an F-35 just like an iPhone, says Dutch defense chief
- 12:34 : From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses
- 12:9 : Fake CAPTCHA Attack Chain Triggers Enterprise-Wide Malware Infection in Organizations
- 12:9 : 1-15 February 2026 Cyber Attacks Timeline
- 12:9 : 3 Ways to Start Your Intelligent Workflow Program
- 12:9 : Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
- 11:32 : ClawHavoc Infects OpenClaw’s ClawHub with 1,184 Malicious Skills, Exposing Data Theft Risks
- 11:32 : U.S. CISA adds Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities catalog
- 11:32 : Building an Effective Incident Response Strategy to Combat Cyberattacks
- 11:32 : Notepad++ secures update channel in wake of supply chain compromise
- 11:31 : Record Number of Ransomware Victims and Groups in 2025
- 11:11 : “Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities
- 11:11 : HackerOne ‘updating’ Ts&Cs after bug hunters question if they’re training AI
- 11:11 : Prompt Control is the New Front Door of Application Security
- 11:11 : One stolen credential is all it takes to compromise everything
- 11:5 : IT Security News Hourly Summary 2026-02-18 12h : 11 posts
- 10:34 : ClickFix Exploits Homebrew Workflow to Deploy Cuckoo Stealer for macOS Credential Theft
- 10:34 : New Phishing Campaign Targets Booking.com Partners and Customers in Multi-Stage Financial Fraud Scheme
- 10:34 : Scammers use fake “Gemini” AI chatbot to sell fake “Google Coin”
- 10:34 : CISA: Hackers Exploiting Vulnerability in Product of Taiwan Security Firm TeamT5
- 10:34 : Security Metrics That Actually Predict a Breach
- 10:34 : Will Your Organization Take the Quantum Leap in 2026? Read This First
- 10:34 : Chinese APT Group Exploits Dell Zero-Day for Two Years
- 10:9 : Palo Alto Networks to Acquire Koi Security for Enhanced Agentic Endpoint Security
- 10:9 : Suped Review – Features, User Experience, Pros & Cons (2026)
- 10:9 : CYBERSPAN brings AI-driven, agentless network detection to MSSP environments
- 10:9 : Qodo unveils AI-driven governance system for code quality control
- 9:34 : Malware Campaign Targets Crypto Users with Fake MetaMask Wallet and Remote Access Backdoor
- 9:34 : Keenadu backdoor found preinstalled on Android devices, powers Ad fraud campaign
- 9:34 : Redefining automation governance: From execution to observability at Bradesco
- 9:34 : New ‘Foxveil’ Malware Loader Leverages Cloudflare, Netlify, and Discord to Evade Detection
- 9:34 : Notepad++ v8.9.2 Released with “Double-Lock” Update Mechanism Following Recent Hack
- 9:34 : Microsoft VS Code Extension with 11M Downloads Expose Developers to One-Click XSS Attacks
- 9:34 : CISA Warns of Google Chromium 0-Day Vulnerability Actively Exploited in Attacks
- 9:34 : ChatGPT Adds Lockdown Mode For High-Risk Users
- 9:9 : CISA Flags Actively Exploited Windows Video ActiveX Control RCE in KEV List
- 9:9 : New SysUpdate Variant Malware Discovered, Decryption Tool for Linux C2 Traffic Released
- 9:9 : APIs Under Siege: Wallarm Report Reveals How AI Is Supercharging Modern Cyberattacks
- 9:9 : Lasso’s Intent Deputy secures AI agents through real-time behavioral intent analysis
- 9:9 : Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
- 9:9 : When AI agent security controls are enough – and when they’re not
- 9:9 : New security research finds governance determines trust in AI
- 9:9 : Data-only extortion grows as ransomware gangs seek better profits
- 9:9 : Newly identified hacking groups provide access to OT environments
- 9:9 : Hackers exploit zero-day flaw in Dell RecoverPoint for Virtual Machines
- 8:34 : Tracking Malware Campaigns With Reused Material, (Wed, Feb 18th)
- 8:34 : Palo Alto Networks to Acquire Koi in Reported $400 Million Transaction
- 8:34 : Hackers Use Fake CAPTCHA To Infect Windows PCs
- 8:34 : Hacking protestors, UK “locks the door,” Kenyan politician phone cracked
- 8:17 : MetaMask Users Targeted by Phishing Emails with Fake Security Report to Bypass Detection
- 8:17 : Claude Sonnet 4.6 launches with improved coding and expanded developer tools
- 8:17 : Microsoft Defender update lets SOC teams manage, vet response tools
- 8:5 : IT Security News Hourly Summary 2026-02-18 09h : 7 posts
- 7:36 : New Malware Campaign ‘CRESCENTHARVEST’ Exploits Iran Protest Sentiment to Deploy Information-Stealing RAT
- 7:36 : Critical Windows Admin Center Vulnerability Allows Privilege Escalation
- 7:36 : Dell RecoverPoint Zero-Day Exploited by Chinese Cyberespionage Group
- 7:36 : AWS coding agents gain new plugin support across development tools
- 7:36 : CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update
- 7:18 : Foxveil Malware Loader Uses Cloudflare, Netlify, and Discord to Bypass Detection
- 7:18 : CISA Warns of Actively Exploited Google Chromium 0‑Day Vulnerability
- 6:34 : New Phishing Campaign Exploits Booking.com Partners, Targets Customers in Multi-Stage Fraud Scheme
- 6:34 : Critical Flaw in Windows Admin Center Exposes Systems to Privilege Escalation Attacks
- 6:34 : Master XDR Investigations: A Deep Dive into the GravityZone XDR Demo Incident
- 6:34 : The defense industrial base is a prime target for cyber disruption
- 6:15 : CRESCENTHARVEST Malware Campaign Uses Iran Protest Lures to Deploy Info‑Stealing RAT
- 6:15 : OpenClaw AI ‘Log Poisoning’ Flaw Enables Malicious Content Injection
- 6:15 : Eurail User Records Up for Sale on the Dark Web
- 6:15 : Everyone uses open source, but patching still moves too slowly
- 5:34 : SecureClaw: Dual stack open-source security plugin and skill for OpenClaw
- 5:34 : Cybersecurity in cross-border logistics operations
- 5:34 : OpenClaw: Info Stealers Take Your Soul
- 5:9 : Dell 0-Day Vulnerability Targeted by Chinese Hackers Since Mid-2024 for Ongoing Malware Campaign
- 5:9 : Palo Alto CEO says AI isn’t great for business, yet
- 5:5 : IT Security News Hourly Summary 2026-02-18 06h : 5 posts
- 4:18 : Credit Card Fraud Emerges with a New Sophisticated Carding-as-a-Service Marketplaces
- 4:18 : Threat Actors Advertising New ‘ClickFix’ Payload That Stores Malware within Browser Cache
- 4:17 : Matanbuchus 3.0 Returns with ClickFix Social Engineering and Silent MSI Installations to Deploy AstarionRAT
- 4:17 : Dell 0-Day Vulnerability Exploited by Chinese Hackers since mid-2024 to Deploy Malware
- 4:17 : Cybercriminals Leverage Atlassian Cloud for Spam Campaigns Redirecting Targets to Fraudulent Investment Schemes
- 3:32 : Is it OK to let your children post selfies online?
- 3:31 : Figure – 967,178 breached accounts
- 2:31 : California Fines Disney $2.75 Million in Record CCPA Case
- 2:15 : ISC Stormcast For Wednesday, February 18th, 2026 https://isc.sans.edu/podcastdetail/9814, (Wed, Feb 18th)
- 2:15 : DigitStealer Gains Attention as macOS-Targeting Infostealer Exposes Key Infrastructure Weaknesses
- 2:15 : AI-Driven Threat Detection for Quantum-Enabled Side-Channel Attacks
- 2:15 : Fraudsters Use Postal Mail to Target Crypto Hardware Wallet Owners
- 0:16 : China-linked snoops have been exploiting Dell 0-day since mid-2024, using ‘ghost NICs’ to avoid detection
- 0:16 : Intellexa’s Predator spyware used to hack iPhone of journalist in Angola, research says
- 0:16 : Understanding User Managed Access
- 0:16 : Can Agentic AI operate independently of continuous human oversight?
- 0:16 : How are DevOps teams empowered by automated secrets rotation?
- 0:16 : How secure are Agentic AI-driven compliance audits?
- 0:15 : Are the investments in Agentic AI security systems justified?
- 23:15 : Securing the New Control Plane: Introducing Static Scanning for AI Agent Configurations
- 23:5 : IT Security News Hourly Summary 2026-02-18 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2026-02-17