Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

18/02/2026 0 Comments 0 tags

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

18/02/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

17/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

17/02/2026 0 Comments 0 tags

A new Android backdoor that’s embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity vendor

SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

17/02/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to deliver an

My Day Getting My Hands Dirty with an NDR System

17/02/2026 0 Comments 0 tags

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

17/02/2026 0 Comments 0 tags

Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In

Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations

17/02/2026 0 Comments 0 tags

New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the “Summarize with AI” button that’s being increasingly placed on websites in ways that

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

17/02/2026 0 Comments 0 tags

Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages. The feature is currently available for

Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers

16/02/2026 0 Comments 0 tags

A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. “The attacks range in severity from