ESET researchers have discovered PromptSpy, the first known Android malware to abuse generative AI as part of its execution flow in order to achieve persistence. This marks the first time generative AI has been deployed in this way. Because the…
Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329)
A critical security vulnerability (CVE-2026-2329) in Grandstream VoIP phones could let hackers remotely take full control of the devices and even intercept calls, Rapid7 researchers discovered. “The vulnerability is present in the device’s web-based API service, and is accessible in…
From Exposure to Exploitation: How AI Collapses Your Response Window
We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a “temporary” API key for testing and forgets to revoke it. In the past,…
Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal This article has been indexed from www.infosecurity-magazine.com Read the original article: Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses…
Intimate products producer Tenga spilled customer data
A phishing attack on a Tenga employee may have exposed US customer data. Customers should watch for sextortion-themed phishing attempts. This article has been indexed from Malwarebytes Read the original article: Intimate products producer Tenga spilled customer data
Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025
Security researchers have seen the vulnerabilities being exploited to deliver shells, conduct reconnaissance, and download malware. The post Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
SPF Alignment: Why is it Important for Improving DMARC
Originally published at SPF Alignment: Why is it Important for Improving DMARC by EasyDMARC. Every day, inboxes receive millions of emails that … The post SPF Alignment: Why is it Important for Improving DMARC appeared first on EasyDMARC. The post…
Citizen Lab Finds Evidence of Mobile Data Extraction from Detained Kenyan Activist
Citizen Lab says it found forensic evidence that Cellebrite’s mobile extraction technology was used on a Samsung Android phone belonging to detained Kenyan activist and politician Boniface Mwangi while the device was in police custody in July 2025. The group…
UK to demand social platforms take down abusive intimate images within 48 hours
‘Why not 12?’ says lawyer The UK is bracketing “intimate images shared without a victim’s consent” along with terror and child sexual abuse material, and demanding that online platforms remove them within two days.… This article has been indexed from…
Meta patents AI that could keep you posting from beyond the grave
Hopefully Meta really will file this in the “just because we can do it doesn’t mean we should” drawer. This article has been indexed from Malwarebytes Read the original article: Meta patents AI that could keep you posting from beyond…
Healthcare security: Write login details on whiteboard, hope for the best
You told me not to write it on a Post-it… Bork!Bork!Bork! Today’s bork is entirely human-generated and will send a shiver down the spine of security pros. No matter how secure a system is, a user’s ability to undo an…
Men sentenced to 8 years in $1.3 million computer intrusion and tax fraud scheme
Matthew A. Akande, a Nigerian national, was sentenced by a U.S. District Court to eight years in prison, followed by three years of supervised release, for his role in a scheme to break into Massachusetts tax preparation firms’ computer networks…
Researchers Uncover DoS Vulnerabilities in Socomec DIRIS M-70 IIoT Power Meter via Thread Emulation & Fuzzing
Selective thread emulation and coverage-guided fuzzing have exposed six denial-of-service (DoS) vulnerabilities in the Socomec DIRIS M-70 IIoT power-monitoring gateway, all of which are now patched under Cisco’s Coordinated Disclosure Policy. The Socomec DIRIS M-70 gateway is a central communications…
Arkanix Stealer: a C++ & Python infostealer
Kaspersky researchers analyze a C++ and Python stealer dubbed “Arkanix Stealer”, which was active for several months, targeted wide range of data, was distributed as MaaS and offered referral program to its partners. This article has been indexed from Securelist…
AI Dev Tool Cline’s npm Token Hijacked by Hackers for 8 Hours
A compromised publish token gave attackers brief but concerning access to the Cline CLI npm package, exposing developers who installed it during an 8-hour window on February 17, 2026. The incident highlights the growing risk of supply chain attacks targeting…
Critical Authentication Bypass in better-auth API Keys Plugin Allows Unauthenticated Account Takeover
A critical authentication bypass vulnerability in the better-auth API keys plugin allows unauthenticated attackers to mint privileged API keys for arbitrary users. The flaw, tracked as CVE-2025-61928, affects all versions of the better-auth library prior to 1.3.26 — a package…
OpenClaw Security Issues Continue as SecureClaw Open Source Tool Debuts
OpenClaw faces security vulnerabilities and misconfiguration risks despite rapid patches and its transition to an OpenAI-backed foundation. The post OpenClaw Security Issues Continue as SecureClaw Open Source Tool Debuts appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
UK sounds alarm on rising cyber risks to businesses
The UK government launched a national campaign urging businesses to strengthen basic cyber defenses. The initiative follows new figures highlighting the scale of the threat. Serious cyber incidents cost businesses an average of £195,000, with about half of small firms…
Flaws in Popular Software Development App Extensions Allow Data Exfiltration
Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched This article has been indexed from www.infosecurity-magazine.com Read the original article: Flaws in Popular Software Development App Extensions Allow Data Exfiltration
IT Security News Hourly Summary 2026-02-19 12h : 7 posts
7 posts were published in the last hour 10:34 : How to Organize Safely in the Age of Surveillance 10:34 : Irish regulator probes X after Grok allegedly generated sexual images of children 10:34 : Fake IPTV Apps Spread Massiv…
How to Organize Safely in the Age of Surveillance
From threat modeling to encrypted collaboration apps, we’ve collected experts’ tips and tools for safely and effectively building a group—even while being targeted and tracked by the powerful. This article has been indexed from Security Latest Read the original article:…
Irish regulator probes X after Grok allegedly generated sexual images of children
Ireland’s Data Protection Commission opened a probe into X over Grok AI tool allegedly generating sexual images, including of children. Ireland’s Data Protection Commission has launched another investigation into X over Grok’s AI image generator. The probe focuses on reports…
Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users
Cybersecurity researchers have disclosed details of a new Android trojan called Massiv that’s designed to facilitate device takeover (DTO) attacks for financial theft. The malware, according to ThreatFabric, masquerades as seemingly harmless IPTV apps to deceive victims, indicating that the…
Copilot summarizes confidential emails, ShinyHunters targets CarGurus, Texas sues TP-Link
Microsoft Copilot summarizes confidential emails ShinyHunters takes CarGurus records Texas sues TP-Link over router hack Get the full show notes here: Huge thanks to our sponsor, Conveyor Every fast-growing company hits this one moment. Sales wants to close bigger enterprise…