ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

19/02/2026 0 Comments 0 tags

The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new security gaps are showing up across platforms, tools, and industries — often

From Exposure to Exploitation: How AI Collapses Your Response Window

19/02/2026 0 Comments 0 tags

We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep the sprint moving. An engineer generates a “temporary” API key

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

19/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new Android trojan called Massiv that’s designed to facilitate device takeover (DTO) attacks for financial theft. The malware, according to ThreatFabric, masquerades as

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

19/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran’s ongoing protests to conduct information theft and long-term espionage. The Acronis Threat Research Unit

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

18/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

18/02/2026 0 Comments 0 tags

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident’s phone,

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

18/02/2026 0 Comments 0 tags

In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

18/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors to steal local files and

3 Ways to Start Your Intelligent Workflow Program

18/02/2026 0 Comments 0 tags

Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

18/02/2026 0 Comments 0 tags

A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according to a