The first known Android malware family to weaponize a generative AI model, specifically Google’s Gemini, as part of its active execution flow. Discovered in February 2026, the malware represents a significant evolutionary step in mobile threats and follows ESET’s earlier…
Tag: EN
Selective Thread Emulation and Fuzzing Expose DoS Flaws in Socomec DIRIS M-70 IIoT Device
Security researchers have uncovered six critical denial-of-service vulnerabilities in the Socomec DIRIS M-70 industrial gateway used for power monitoring and energy management in critical infrastructure. The flaws were discovered through an innovative emulation technique that bypassed hardware debugging limitations by…
French Government Says 1.2 Million Bank Accounts Exposed in Breach
The Ministry of Economy reported discovering unauthorized access to the national bank account registry FICOBA. The post French Government Says 1.2 Million Bank Accounts Exposed in Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Abstract Security Launches AI SIEM Platform to Analyze Threats In Real Time
Abstract Security today added a modular security information and event management (SIEM) platform to its portfolio that also makes use of artificial intelligence (AI) to surface threats in near real time. Company CEO Colby DeRodeff said the AI-Gen Composable SIEM…
Poland restricts Chinese-made cars at protected military sites
Poland’s military leadership has decided that cars manufactured in the People’s Republic of China will no longer cross the gates of sensitive military bases. The decision follows a risk analysis focused on the growing integration of digital systems in cars…
Simbian AI Pentest Agent delivers continuous, context-aware penetration testing
Simbian announced the launch of the Simbian AI Pentest Agent, a new solution designed to provide enterprises with ongoing, on-demand penetration testing. Simbian’s AI Pentest Agent is the first automated penetration testing solution to incorporate business context, ensuring that findings…
Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia
Fraud campaign exploiting Indonesia’s Coretax resulted in $1.5m to $2m in losses via malicious apps This article has been indexed from www.infosecurity-magazine.com Read the original article: Industrial-Scale Fake Coretax Apps Drive $2m Fraud in Indonesia
Cyber Briefing: 2026.02.19
Dell zero-day exploited, CISA flags active flaws, Android firmware backdoor found, major data breaches surface, regulators probe X over Grok imagery. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.02.19
China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware
Dell warns of a critical security hole in its RecoverPoint software exploited by hackers. Learn how to protect your data from the CVE-2026-22769 vulnerability and the new GrimBolt malware. This article has been indexed from Hackread – Cybersecurity News, Data…
Forescout research points to record number of ICS vulnerabilities in 2025
Forescout has released new research warning that industrial control systems (ICS) are facing unprecedented levels of cyber risk, with 2025 marking the highest number of recorded vulnerabilities to date. The report, ICS Cybersecurity in 2026: Vulnerabilities and the Path Forward,…
AI-generated passwords are a security risk
AI-generated passwords are “highly predictable” and aren’t truly random, making them easier for cybercriminals to crack. This article has been indexed from Malwarebytes Read the original article: AI-generated passwords are a security risk
Data on 1.2 million French bank accounts accessed in registry breach
In late January 2026, a malicious intruder accessed France’s national bank account registry, FICOBA, enabling them to view information tied to 1.2 million accounts, the Ministry of the Economy and Finance disclosed on Wednesday. TV5 Monde reported that the perpetrator…
ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories
The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up across platforms, tools, and industries — often all at the same time. Some developments are headline-level. Others…
Spanish Police Arrest Hotel Hacker
Spanish authorities have apprehended a 20-year-old man for allegedly hacking a hotel booking platform to secure luxury accommodations for just one cent. This article has been indexed from CyberMaterial Read the original article: Spanish Police Arrest Hotel Hacker
Irish Regulator Probes X Over Grok
Ireland’s Data Protection Commission has initiated a formal investigation into X following reports that its Grok AI tool generated significant amounts of non-consensual sexualized imagery. This article has been indexed from CyberMaterial Read the original article: Irish Regulator Probes X…
Keenadu Firmware Backdoor Hits Android
Kaspersky has identified a sophisticated Android backdoor named Keenadu that is embedded directly into device firmware to harvest data and enable remote control. This article has been indexed from CyberMaterial Read the original article: Keenadu Firmware Backdoor Hits Android
Adidas Probes Third-Party Data Breach
Adidas is currently investigating a data breach involving an independent partner that handles the company’s martial arts product distribution. This article has been indexed from CyberMaterial Read the original article: Adidas Probes Third-Party Data Breach
Cyberattack Leaks 115K Asahi Records
A cyberattack on Asahi Group Holdings resulted in the confirmed leak of over 115,000 sets of personal records belonging to both employees and corporate clients. This article has been indexed from CyberMaterial Read the original article: Cyberattack Leaks 115K Asahi…
Hacker Accessed 1.2M Bank Accounts
A hacker accessed a French national database containing information on 1.2 million bank accounts using stolen credentials from a public official. This article has been indexed from CyberMaterial Read the original article: Hacker Accessed 1.2M Bank Accounts
DEF CON Bans Named Epstein Files
The DEF CON hacker conference has officially banned Vincenzo Iozzo, Joichi Ito, and Pablos Holman following the release of Justice Department documents linking them to Jeffrey Epstein. This article has been indexed from CyberMaterial Read the original article: DEF CON…