π¨ Researchers detect active exploitation of a critical React Native CLI flaw.
CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.
π Read β https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.
π Read β https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
π€―12β‘2π2
π’ WEBINAR ALERT β Adding tools hasnβt made SOCs calmer or faster. Itβs mostly added noise.
In this session, two SOC operators walk through practical build vs buy decisions, real models, and a customer case study you can reuse.
π Join to Watch: https://thehackernews.com/2026/02/webinar-smarter-soc-blueprint-learn.html
In this session, two SOC operators walk through practical build vs buy decisions, real models, and a customer case study you can reuse.
π Join to Watch: https://thehackernews.com/2026/02/webinar-smarter-soc-blueprint-learn.html
β‘4π2π2π₯1
β οΈ A critical flaw in Dockerβs Ask Gordon AI let container metadata execute real commands.
A single malicious Docker LABEL could pass through the MCP gateway and run tools with user privileges. Fixed in version 4.50.0.
π DockerDash details β https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
A single malicious Docker LABEL could pass through the MCP gateway and run tools with user privileges. Fixed in version 4.50.0.
π DockerDash details β https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
π13β‘5π3π₯1
π¨ SolarWinds Web Help Desk flaw added to CISA KEV
β’ CVE-2025-40551 (CVSS 9.8): unauthenticated RCE via deserialization
β’ Fixed in WHD v2026.1
β’ Federal agencies must patch by February 6
π Read β https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
β’ CVE-2025-40551 (CVSS 9.8): unauthenticated RCE via deserialization
β’ Fixed in WHD v2026.1
β’ Federal agencies must patch by February 6
π Read β https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
π₯6β‘3π2
π Eclipse Foundation will add pre-publish security checks to the Open VSX extension registry.
This shifts enforcement from post-report cleanup to blocking risky uploads before release, targeting impersonation, leaked secrets, and known malicious patterns.
π Details β https://thehackernews.com/2026/02/eclipse-foundation-mandates-pre-publish.html
This shifts enforcement from post-report cleanup to blocking risky uploads before release, targeting impersonation, leaked secrets, and known malicious patterns.
π Details β https://thehackernews.com/2026/02/eclipse-foundation-mandates-pre-publish.html
π8π€―3π€2β‘1
π Microsoft warns infostealers are expanding from Windows to macOS.
Since late 2025, malvertising (Google Ads) and ClickFix lures have delivered fake DMG installers. Python-based stealers abuse native macOS tools + AppleScript to extract creds, cookies, and iCloud Keychain data.
π Attack chain and theft capabilities β https://thehackernews.com/2026/02/microsoft-warns-python-infostealers.html
Since late 2025, malvertising (Google Ads) and ClickFix lures have delivered fake DMG installers. Python-based stealers abuse native macOS tools + AppleScript to extract creds, cookies, and iCloud Keychain data.
π Attack chain and theft capabilities β https://thehackernews.com/2026/02/microsoft-warns-python-infostealers.html
π9π5π5
π‘οΈ Mid-market firms arenβt under-secured. IBM finds 83 security tools on average, and complexity is the real blocker.
The gaps come from unused EDR, alert overload, and weak preventionβnot missing tools.
π Simplifying security across the full threat lifecycle β https://thehackernews.com/expert-insights/2026/02/how-to-secure-your-mid-market-business.html
The gaps come from unused EDR, alert overload, and weak preventionβnot missing tools.
π Simplifying security across the full threat lifecycle β https://thehackernews.com/expert-insights/2026/02/how-to-secure-your-mid-market-business.html
π7
π οΈππ Most incident response failures start in the first moments. Early responder decisions on evidence and scope shape the case.
That window repeats as scope expands. Isolating systems too fast can hide real intrusion patterns.
π Inside the first 90 seconds β https://thehackernews.com/2026/02/the-first-90-seconds-how-early.html
That window repeats as scope expands. Isolating systems too fast can hide real intrusion patterns.
π Inside the first 90 seconds β https://thehackernews.com/2026/02/the-first-90-seconds-how-early.html
π9
mai.gif
14.2 MB
Identity risk now sits beyond IAM β inside apps, APIs, and service accounts.
π§© Identity Dark Matter includes hardcoded credentials, orphaned accounts, and access paths outside identity providers β largely invisible to traditional tools.
π Learn how Orchid uncovers Identity Dark Matter β https://thehackernews.com/2026/02/orchid-security-introduces-continuous.html
π§© Identity Dark Matter includes hardcoded credentials, orphaned accounts, and access paths outside identity providers β largely invisible to traditional tools.
π Learn how Orchid uncovers Identity Dark Matter β https://thehackernews.com/2026/02/orchid-security-introduces-continuous.html
π6β‘1
π¨ All 24 GenAI models failed our security testing
We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.
Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models
What's in the report:
β Detailed security profiles of 24 GenAI models
β Analysis of the AI prevention gap
β Practical strategies for securing AI systems
β Compliance and risk management guidance
As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.
Download the full report: https://thn.news/gen-ai-tg-report
We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.
Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models
What's in the report:
β Detailed security profiles of 24 GenAI models
β Analysis of the AI prevention gap
β Practical strategies for securing AI systems
β Compliance and risk management guidance
As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.
Download the full report: https://thn.news/gen-ai-tg-report
π4π₯3π2π€1
This media is not supported in your browser
VIEW IN TELEGRAM
π¨π³ China-linked Amaranth-Dragon targeted Southeast Asian government and law enforcement networks in 2025, with links to the APT41 ecosystem.
Campaigns leveraged political lures and the WinRAR CVE-2025-8088 RCE flaw, using cloud delivery and geo-fenced infrastructure for stealth.
π Read β https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html
Campaigns leveraged political lures and the WinRAR CVE-2025-8088 RCE flaw, using cloud delivery and geo-fenced infrastructure for stealth.
π Read β https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html
π₯13π3π€2π€―2β‘1π1π±1
Threat actors are delivering AsyncRAT via IPFS-hosted VHD files in DEAD#VAX.
Phishing emails mount fake PDF drives that run obfuscated scripts and in-memory shellcode inside trusted Windows processesβminimal disk trace.
π§ Fileless
π°οΈ IPFS
πͺ Process injection
πRead β https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html
Phishing emails mount fake PDF drives that run obfuscated scripts and in-memory shellcode inside trusted Windows processesβminimal disk trace.
π§ Fileless
π°οΈ IPFS
πͺ Process injection
πRead β https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html
π₯7π6π3β‘1
β‘ Microsoft built a scanner to detect backdoors in open-weight LLMs π§ using 3 behavioral signals.
It flags trigger attention spikes, memorized poisoning data leaks, and fuzzy trigger activationβno retraining required. Built to scan open models at scale.
π Signals, detection method, limits, AI SDL shift β https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html
It flags trigger attention spikes, memorized poisoning data leaks, and fuzzy trigger activationβno retraining required. Built to scan open models at scale.
π Signals, detection method, limits, AI SDL shift β https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html
π11π€―6π4π1
βοΈ Cloud attacks move fast. Evidence disappears faster.
Context-aware cloud forensics host data automatically and uses AI to rebuild real attack timelines in minutesβnot days. Practical investigation workflows included.
π₯ Join the live session...
Telemetry model, AI analysis, response use cases β https://thehacker.news/forensics-reimagined
Context-aware cloud forensics host data automatically and uses AI to rebuild real attack timelines in minutesβnot days. Practical investigation workflows included.
π₯ Join the live session...
Telemetry model, AI analysis, response use cases β https://thehacker.news/forensics-reimagined
π±6π3
β οΈ Attackers are hijacking live web traffic by weaponizing NGINX configs linked to React2Shell exploitation.
Rogue proxy rules silently reroute user sessions through attacker infrastructureβimpacting ποΈ gov, πedu, and Asian π TLD sites.
π Details β https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
Rogue proxy rules silently reroute user sessions through attacker infrastructureβimpacting ποΈ gov, πedu, and Asian π TLD sites.
π Details β https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
π17π€6β‘4π1
β οΈ Critical RCE flaw in n8n (CVE-2026-25049, CVSS 9.4) lets authenticated users execute system commands via crafted workflow expressions.
Public webhooks exposed β remote trigger, credential theft, server takeover.
π Exploit path, affected versions, patch details β https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
Public webhooks exposed β remote trigger, credential theft, server takeover.
π Exploit path, affected versions, patch details β https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
π9π5
Passwords are sliding into legacy status.
Passkeys, AI governance, and verifiable credentials are scaling as identity shifts to real-time trust β per Rex Booth, SailPoint.
π 9 predictions reshaping identity security β https://thehackernews.com/expert-insights/2026/02/9-identity-security-predictions-for-2026.html
Passkeys, AI governance, and verifiable credentials are scaling as identity shifts to real-time trust β per Rex Booth, SailPoint.
π 9 predictions reshaping identity security β https://thehackernews.com/expert-insights/2026/02/9-identity-security-predictions-for-2026.html
π€12π6
π» Iran-linked APT Infy paused C2 ops during Iranβs Jan internet blackout β then rebuilt infrastructure as access returned.
Timing ties activity to state network controls. Latest malware uses Telegram + HTTP for dual-channel C2.
π Timeline, tooling evolution, infra rebuild β https://thehackernews.com/2026/02/infy-hackers-resume-operations-with-new.html
Timing ties activity to state network controls. Latest malware uses Telegram + HTTP for dual-channel C2.
π Timeline, tooling evolution, infra rebuild β https://thehackernews.com/2026/02/infy-hackers-resume-operations-with-new.html
π11π10
β οΈ AI is everywhere in the enterprise β SaaS, browsers, copilots, shadow tools. Visibility is years behind adoption.
Legacy controls miss real interaction points, leaving prompts, uploads, and agent workflows ungoverned.
π Download guide link β https://thehackernews.com/2026/02/the-buyers-guide-to-ai-usage-control.html
Legacy controls miss real interaction points, leaving prompts, uploads, and agent workflows ungoverned.
π Download guide link β https://thehackernews.com/2026/02/the-buyers-guide-to-ai-usage-control.html
π5
π¦β οΈ Is your container adoption outpacing your security maturity? Youβre not alone.
ActiveStateβs 2026 State of Vulnerability Management & Remediation Report found 82% of DevSecOps leaders experienced a container-related breach last year and 87% expect one in 2026.
Learn how to close the βremediation gapβ and the role AI will play in securing your stack by 2026.
π₯ Download the report β https://thn.news/container-sec-guide
ActiveStateβs 2026 State of Vulnerability Management & Remediation Report found 82% of DevSecOps leaders experienced a container-related breach last year and 87% expect one in 2026.
Learn how to close the βremediation gapβ and the role AI will play in securing your stack by 2026.
π₯ Download the report β https://thn.news/container-sec-guide
π4β‘1
π¨ ThreatsDay Bulletin is live.
This weekβs signals point to a quieter but faster threat landscape:
β’ Codespaces RCE & dev workflow abuse
β’ AI-assisted cloud intrusions
β’ BYOVD driver exploitation
β’ AsyncRAT C2 exposure
β’ Sandbox escape flaws
β’ RMM persistence campaigns
β’ Crypto drainer ecosystems
β’ Botnet & DDoS scaling ops
β’ Supply-chain injection paths
β’ APT & crimeware infra overlap
Attack paths are blending into trusted environments β cloud, identity, drivers, and developer tooling.
All updates in one place β https://thehackernews.com/2026/02/threatsday-bulletin-codespaces-rce.html
This weekβs signals point to a quieter but faster threat landscape:
β’ Codespaces RCE & dev workflow abuse
β’ AI-assisted cloud intrusions
β’ BYOVD driver exploitation
β’ AsyncRAT C2 exposure
β’ Sandbox escape flaws
β’ RMM persistence campaigns
β’ Crypto drainer ecosystems
β’ Botnet & DDoS scaling ops
β’ Supply-chain injection paths
β’ APT & crimeware infra overlap
Attack paths are blending into trusted environments β cloud, identity, drivers, and developer tooling.
All updates in one place β https://thehackernews.com/2026/02/threatsday-bulletin-codespaces-rce.html
π7