Google has released Chrome 145 to the stable channel for Windows, Mac, and Linux systems, addressing 11 security vulnerabilities that could allow attackers to execute malicious code on affected systems. The update, announced on February 10, 2026, will roll out…
Nucleus Raises $20 Million for Exposure Management
The company will use the investment to scale operations and deepen intelligence and automation. The post Nucleus Raises $20 Million for Exposure Management appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Nucleus Raises…
The FBI Recovered “Deleted” Nest Cam Footage — Here’s Why Every CISO Should Panic
The Nancy Guthrie case reveals data retention issues in cloud technology, as investigators recovered footage from a Google Nest camera that should have been deleted, emphasizing the need for stronger cybersecurity measures for IoT devices The post The FBI Recovered…
Time to Exploit Plummets as N-Day Flaws Dominate
Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation This article has been indexed from www.infosecurity-magazine.com Read the original article: Time to Exploit Plummets as N-Day Flaws Dominate
Stellantis Looks To Exit Samsung EV Battery Venture
Stellantis reportedly looking to pull out of US EV battery joint venture with Samsung, after US policy shift spreads gloom in sector This article has been indexed from Silicon UK Read the original article: Stellantis Looks To Exit Samsung EV…
Publishers File EU Complaint Over Google Summaries
Latest formal complaint could add weight to existing Commission probe over ‘forced’ use of content to power AI Overviews This article has been indexed from Silicon UK Read the original article: Publishers File EU Complaint Over Google Summaries
India Sharply Reduces Content Takedown Deadline
Indian government says large social media platforms must remove content deemed illegal in three hours, down from 36, in major shift This article has been indexed from Silicon UK Read the original article: India Sharply Reduces Content Takedown Deadline
EssilorLuxottica Sees Sales Boost From Meta Glasses
World’s largest glasses maker, owner of Ray-Ban and Oakley brands, sees 18 percent rise in sales in fourth quarter after AI boost This article has been indexed from Silicon UK Read the original article: EssilorLuxottica Sees Sales Boost From Meta…
Meta Breaks Ground On $10bn Indiana Data Centre
Facebook parent Meta begins construction of facility planned to cover 4 million square feet with 1 GW of compute capacity This article has been indexed from Silicon UK Read the original article: Meta Breaks Ground On $10bn Indiana Data Centre
Palo Alto Networks Firewall Vulnerability Lets Attackers Trigger Reboot Loops
Palo Alto Networks has disclosed a PAN-OS firewall vulnerability that can let remote attackers force repeated reboots, potentially pushing a device into a “reboot loop” that ends in maintenance mode. Tracked as CVE-2026-0229, the issue sits in the Advanced DNS…
WordPress Backup Plugin Vulnerability Exposes 800,000 Sites to Remote Code Execution Attacks
A critical vulnerability in the popular WPvivid Backup & Migration plugin is putting more than 800,000 WordPress websites at risk of complete takeover through remote code execution (RCE) attacks. Tracked as CVE-2026-1357 and rated 9.8 on the CVSS scale, the…
Palo Alto Networks Firewall Vulnerability Allows an Attacker to Force Firewalls into a Reboot Loop
A critical denial-of-service (DoS) flaw in Palo Alto Networks’ PAN-OS software could let unauthenticated attackers crash firewalls into endless reboot cycles, potentially crippling enterprise networks. Dubbed CVE-2026-0229, the vulnerability lurks in the Advanced DNS Security (ADNS) feature. An attacker sends…
$44 Evilmouse Autonomously Executes Commands and Compromises Systems Once Connected
A $44 hardware implant disguised as an ordinary computer mouse. This device acts as a covert keystroke injector, akin to the Hak5 Rubber Ducky, but leverages the innocuous form factor of a mouse to bypass basic user awareness training. Plug…
Promptware – Hackers Can Use Google Calendar Invites to Stream Victims’ Cameras via Zoom
A new and dangerous class of cyberattack called “Promptware” has been discovered, capable of turning your personal AI assistant into a sleeper agent that spies on you. Security researchers from Ben-Gurion University, Tel Aviv University, and Harvard have demonstrated a…
OpenVPN releases version 2.7.0 with expanded protocol and platform updates
OpenVPN version 2.7.0 is now available. The update advances support for multi-address server configurations and updates client functionality across operating systems. The release includes enhancements in data channel handling and support for evolving kernel and cryptographic components. Server enhancements Version…
Crazy gang abuses employee monitoring tool, Nevada unveils new data classification, Georgia healthcare breach impact grows
Crazy gang abuses employee monitoring tool Nevada unveils new data classification Georgia healthcare breach impacts more than 620,000 Get the show notes here: Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers…
OpenClaw: Hit the ground running, with security lagging behind
OpenClaw has cause quite the stir among AI enthusiasts during the past few weeks – and it has also been cause for a few more gray hairs among security experts. But what is the whole hoopla about with OpenClaw? This…
BlueCat Horizon unifies DNS, DHCP, IPAM, and security into a cloud-first intelligent NetOps platform
BlueCat Networks has unveiled BlueCat Horizon, a SaaS-based platform designed to modernize how enterprises and mid-market organizations operate, secure, and evolve their networks through AI-assisted insights and coordinated action across the network. BlueCat Horizon introduces a common set of platform…
83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure offered by PROSPERO. Threat intelligence firm GreyNoise said…
Malicious ‘duer-js’ NPM Package Distributes ‘Bada Stealer’ Malware Targeting Windows and Discord Users
A newly discovered malicious NPM package, dubbed duer-js , is being used to distribute an advanced information‑stealing malware that primarily targets Windows systems and Discord users. Published by the user “luizaearlyx”, the package contains a custom infostealer calling itself “bada stealer”, and…
Criminals are using AI website builders to clone major brands
AI-assisted website builders are making it far easier for scammers to impersonate well-known and trusted brands, including Malwarebytes. This article has been indexed from Malwarebytes Read the original article: Criminals are using AI website builders to clone major brands
Apple Patches iOS Zero-Day Exploited in ‘Extremely Sophisticated Attack’
Impacting the ‘dyld’ system component, the memory corruption issue can be exploited for arbitrary code execution. The post Apple Patches iOS Zero-Day Exploited in ‘Extremely Sophisticated Attack’ appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
IT Security News Hourly Summary 2026-02-12 09h : 9 posts
9 posts were published in the last hour 7:34 : OysterLoader Unmasked: The Multi-Stage Evasion Loader 7:34 : Lazarus Group’s ‘Graphalgo’ Fake Recruiter Campaign Targets GitHub, npm, and PyPI to Spread Malware 7:34 : Adblock Filters Expose User Location Even…
OysterLoader Unmasked: The Multi-Stage Evasion Loader
Introduction OysterLoader, also known as Broomstick and CleanUp, is a malware developed in C++, composed of multiple stages, belonging to the loader (A.k.a.: downloader) malware family. First reported in June 2024 by Rapid7, it is mainly distributed via web sites…