π€ Mozilla will add 1-click Firefox setting to fully disable generative AI features.
With Firefox 148, users can block all current and future AI features or manage them individually, keeping AI strictly opt-in as browsers add more automation.
π Read β https://thehackernews.com/2026/02/mozilla-adds-one-click-option-to.html
With Firefox 148, users can block all current and future AI features or manage them individually, keeping AI strictly opt-in as browsers add more automation.
π Read β https://thehackernews.com/2026/02/mozilla-adds-one-click-option-to.html
π₯38π16π4π±4β‘1
πΈοΈ Exposed C2 server showed a complete BYOB botnet in the open π§
Droppers, loaders, and RATs for Windows, Linux, and macOS were publicly accessible, revealing a multi-stage chain for evasion, persistence, and control. Crypto miners were also hosted.
π Read β https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html#:~:text=Exposed%20C2%20Server%20Reveals%20BYOB%20Infrastructure
Droppers, loaders, and RATs for Windows, Linux, and macOS were publicly accessible, revealing a multi-stage chain for evasion, persistence, and control. Crypto miners were also hosted.
π Read β https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html#:~:text=Exposed%20C2%20Server%20Reveals%20BYOB%20Infrastructure
π₯9β‘4π€―3π2
π‘οΈ Russia-linked APT28 exploited a newly disclosed Microsoft Office flaw within days of disclosure.
CVE-2026-21509 was used via malicious RTF files, with geo-fenced delivery targeting Ukraine, Slovakia, and Romania.
π Read β https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html
CVE-2026-21509 was used via malicious RTF files, with geo-fenced delivery targeting Ukraine, Slovakia, and Romania.
π Read β https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html
π12π€―10π₯5β‘1
π Major cloud outages didnβt just break appsβthey broke access.
When shared cloud services fail, identity systems fail too, even if the IdP is running. Authentication depends on databases, DNS, and control planes.
π How cloud outages cascade into identity failures β https://thehackernews.com/2026/02/when-cloud-outages-ripple-across.html
When shared cloud services fail, identity systems fail too, even if the IdP is running. Authentication depends on databases, DNS, and control planes.
π How cloud outages cascade into identity failures β https://thehackernews.com/2026/02/when-cloud-outages-ripple-across.html
π7π4π€3β‘2π€―1
Want to enhance your cyber resilience with strategies and insights from industry leaders? Sign up for Infosec Compliance Now and earn up to 4 free CPE credits!
This virtual event will explore:
βοΈ Structuring AI governance programs
βοΈ Establishing continuous control monitoring
βοΈ Navigating the current cyber risk landscape
Register Now β https://thn.news/cyber-risk-summit
This virtual event will explore:
βοΈ Structuring AI governance programs
βοΈ Establishing continuous control monitoring
βοΈ Navigating the current cyber risk landscape
Register Now β https://thn.news/cyber-risk-summit
π6π2
π¨ Researchers detect active exploitation of a critical React Native CLI flaw.
CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.
π Read β https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.
π Read β https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
π€―12β‘2π2
π’ WEBINAR ALERT β Adding tools hasnβt made SOCs calmer or faster. Itβs mostly added noise.
In this session, two SOC operators walk through practical build vs buy decisions, real models, and a customer case study you can reuse.
π Join to Watch: https://thehackernews.com/2026/02/webinar-smarter-soc-blueprint-learn.html
In this session, two SOC operators walk through practical build vs buy decisions, real models, and a customer case study you can reuse.
π Join to Watch: https://thehackernews.com/2026/02/webinar-smarter-soc-blueprint-learn.html
β‘4π2π2π₯1
β οΈ A critical flaw in Dockerβs Ask Gordon AI let container metadata execute real commands.
A single malicious Docker LABEL could pass through the MCP gateway and run tools with user privileges. Fixed in version 4.50.0.
π DockerDash details β https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
A single malicious Docker LABEL could pass through the MCP gateway and run tools with user privileges. Fixed in version 4.50.0.
π DockerDash details β https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
π13β‘5π3π₯1
π¨ SolarWinds Web Help Desk flaw added to CISA KEV
β’ CVE-2025-40551 (CVSS 9.8): unauthenticated RCE via deserialization
β’ Fixed in WHD v2026.1
β’ Federal agencies must patch by February 6
π Read β https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
β’ CVE-2025-40551 (CVSS 9.8): unauthenticated RCE via deserialization
β’ Fixed in WHD v2026.1
β’ Federal agencies must patch by February 6
π Read β https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
π₯6β‘3π2
π Eclipse Foundation will add pre-publish security checks to the Open VSX extension registry.
This shifts enforcement from post-report cleanup to blocking risky uploads before release, targeting impersonation, leaked secrets, and known malicious patterns.
π Details β https://thehackernews.com/2026/02/eclipse-foundation-mandates-pre-publish.html
This shifts enforcement from post-report cleanup to blocking risky uploads before release, targeting impersonation, leaked secrets, and known malicious patterns.
π Details β https://thehackernews.com/2026/02/eclipse-foundation-mandates-pre-publish.html
π8π€―3π€2β‘1
π Microsoft warns infostealers are expanding from Windows to macOS.
Since late 2025, malvertising (Google Ads) and ClickFix lures have delivered fake DMG installers. Python-based stealers abuse native macOS tools + AppleScript to extract creds, cookies, and iCloud Keychain data.
π Attack chain and theft capabilities β https://thehackernews.com/2026/02/microsoft-warns-python-infostealers.html
Since late 2025, malvertising (Google Ads) and ClickFix lures have delivered fake DMG installers. Python-based stealers abuse native macOS tools + AppleScript to extract creds, cookies, and iCloud Keychain data.
π Attack chain and theft capabilities β https://thehackernews.com/2026/02/microsoft-warns-python-infostealers.html
π9π5π5
π‘οΈ Mid-market firms arenβt under-secured. IBM finds 83 security tools on average, and complexity is the real blocker.
The gaps come from unused EDR, alert overload, and weak preventionβnot missing tools.
π Simplifying security across the full threat lifecycle β https://thehackernews.com/expert-insights/2026/02/how-to-secure-your-mid-market-business.html
The gaps come from unused EDR, alert overload, and weak preventionβnot missing tools.
π Simplifying security across the full threat lifecycle β https://thehackernews.com/expert-insights/2026/02/how-to-secure-your-mid-market-business.html
π7
π οΈππ Most incident response failures start in the first moments. Early responder decisions on evidence and scope shape the case.
That window repeats as scope expands. Isolating systems too fast can hide real intrusion patterns.
π Inside the first 90 seconds β https://thehackernews.com/2026/02/the-first-90-seconds-how-early.html
That window repeats as scope expands. Isolating systems too fast can hide real intrusion patterns.
π Inside the first 90 seconds β https://thehackernews.com/2026/02/the-first-90-seconds-how-early.html
π9
mai.gif
14.2 MB
Identity risk now sits beyond IAM β inside apps, APIs, and service accounts.
π§© Identity Dark Matter includes hardcoded credentials, orphaned accounts, and access paths outside identity providers β largely invisible to traditional tools.
π Learn how Orchid uncovers Identity Dark Matter β https://thehackernews.com/2026/02/orchid-security-introduces-continuous.html
π§© Identity Dark Matter includes hardcoded credentials, orphaned accounts, and access paths outside identity providers β largely invisible to traditional tools.
π Learn how Orchid uncovers Identity Dark Matter β https://thehackernews.com/2026/02/orchid-security-introduces-continuous.html
π6β‘1
π¨ All 24 GenAI models failed our security testing
We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.
Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models
What's in the report:
β Detailed security profiles of 24 GenAI models
β Analysis of the AI prevention gap
β Practical strategies for securing AI systems
β Compliance and risk management guidance
As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.
Download the full report: https://thn.news/gen-ai-tg-report
We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.
Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models
What's in the report:
β Detailed security profiles of 24 GenAI models
β Analysis of the AI prevention gap
β Practical strategies for securing AI systems
β Compliance and risk management guidance
As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.
Download the full report: https://thn.news/gen-ai-tg-report
π4π₯3π2π€1
This media is not supported in your browser
VIEW IN TELEGRAM
π¨π³ China-linked Amaranth-Dragon targeted Southeast Asian government and law enforcement networks in 2025, with links to the APT41 ecosystem.
Campaigns leveraged political lures and the WinRAR CVE-2025-8088 RCE flaw, using cloud delivery and geo-fenced infrastructure for stealth.
π Read β https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html
Campaigns leveraged political lures and the WinRAR CVE-2025-8088 RCE flaw, using cloud delivery and geo-fenced infrastructure for stealth.
π Read β https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html
π₯13π3π€2π€―2β‘1π1π±1
Threat actors are delivering AsyncRAT via IPFS-hosted VHD files in DEAD#VAX.
Phishing emails mount fake PDF drives that run obfuscated scripts and in-memory shellcode inside trusted Windows processesβminimal disk trace.
π§ Fileless
π°οΈ IPFS
πͺ Process injection
πRead β https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html
Phishing emails mount fake PDF drives that run obfuscated scripts and in-memory shellcode inside trusted Windows processesβminimal disk trace.
π§ Fileless
π°οΈ IPFS
πͺ Process injection
πRead β https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html
π₯7π6π3β‘1
β‘ Microsoft built a scanner to detect backdoors in open-weight LLMs π§ using 3 behavioral signals.
It flags trigger attention spikes, memorized poisoning data leaks, and fuzzy trigger activationβno retraining required. Built to scan open models at scale.
π Signals, detection method, limits, AI SDL shift β https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html
It flags trigger attention spikes, memorized poisoning data leaks, and fuzzy trigger activationβno retraining required. Built to scan open models at scale.
π Signals, detection method, limits, AI SDL shift β https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html
π11π€―6π4π1
βοΈ Cloud attacks move fast. Evidence disappears faster.
Context-aware cloud forensics host data automatically and uses AI to rebuild real attack timelines in minutesβnot days. Practical investigation workflows included.
π₯ Join the live session...
Telemetry model, AI analysis, response use cases β https://thehacker.news/forensics-reimagined
Context-aware cloud forensics host data automatically and uses AI to rebuild real attack timelines in minutesβnot days. Practical investigation workflows included.
π₯ Join the live session...
Telemetry model, AI analysis, response use cases β https://thehacker.news/forensics-reimagined
π±6π3
β οΈ Attackers are hijacking live web traffic by weaponizing NGINX configs linked to React2Shell exploitation.
Rogue proxy rules silently reroute user sessions through attacker infrastructureβimpacting ποΈ gov, πedu, and Asian π TLD sites.
π Details β https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
Rogue proxy rules silently reroute user sessions through attacker infrastructureβimpacting ποΈ gov, πedu, and Asian π TLD sites.
π Details β https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
π17π€6β‘4π1
β οΈ Critical RCE flaw in n8n (CVE-2026-25049, CVSS 9.4) lets authenticated users execute system commands via crafted workflow expressions.
Public webhooks exposed β remote trigger, credential theft, server takeover.
π Exploit path, affected versions, patch details β https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
Public webhooks exposed β remote trigger, credential theft, server takeover.
π Exploit path, affected versions, patch details β https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
π9π5