π¨ All 24 GenAI models failed our security testing
We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.
Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models
What's in the report:
β Detailed security profiles of 24 GenAI models
β Analysis of the AI prevention gap
β Practical strategies for securing AI systems
β Compliance and risk management guidance
As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.
Download the full report: https://thn.news/gen-ai-tg-report
We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.
Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models
What's in the report:
β Detailed security profiles of 24 GenAI models
β Analysis of the AI prevention gap
β Practical strategies for securing AI systems
β Compliance and risk management guidance
As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.
Download the full report: https://thn.news/gen-ai-tg-report
π4π₯3π2π€1
This media is not supported in your browser
VIEW IN TELEGRAM
π¨π³ China-linked Amaranth-Dragon targeted Southeast Asian government and law enforcement networks in 2025, with links to the APT41 ecosystem.
Campaigns leveraged political lures and the WinRAR CVE-2025-8088 RCE flaw, using cloud delivery and geo-fenced infrastructure for stealth.
π Read β https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html
Campaigns leveraged political lures and the WinRAR CVE-2025-8088 RCE flaw, using cloud delivery and geo-fenced infrastructure for stealth.
π Read β https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html
π₯13π3π€2π€―2β‘1π1π±1
Threat actors are delivering AsyncRAT via IPFS-hosted VHD files in DEAD#VAX.
Phishing emails mount fake PDF drives that run obfuscated scripts and in-memory shellcode inside trusted Windows processesβminimal disk trace.
π§ Fileless
π°οΈ IPFS
πͺ Process injection
πRead β https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html
Phishing emails mount fake PDF drives that run obfuscated scripts and in-memory shellcode inside trusted Windows processesβminimal disk trace.
π§ Fileless
π°οΈ IPFS
πͺ Process injection
πRead β https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html
π₯7π6π3β‘1
β‘ Microsoft built a scanner to detect backdoors in open-weight LLMs π§ using 3 behavioral signals.
It flags trigger attention spikes, memorized poisoning data leaks, and fuzzy trigger activationβno retraining required. Built to scan open models at scale.
π Signals, detection method, limits, AI SDL shift β https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html
It flags trigger attention spikes, memorized poisoning data leaks, and fuzzy trigger activationβno retraining required. Built to scan open models at scale.
π Signals, detection method, limits, AI SDL shift β https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html
π11π€―6π4π1
βοΈ Cloud attacks move fast. Evidence disappears faster.
Context-aware cloud forensics host data automatically and uses AI to rebuild real attack timelines in minutesβnot days. Practical investigation workflows included.
π₯ Join the live session...
Telemetry model, AI analysis, response use cases β https://thehacker.news/forensics-reimagined
Context-aware cloud forensics host data automatically and uses AI to rebuild real attack timelines in minutesβnot days. Practical investigation workflows included.
π₯ Join the live session...
Telemetry model, AI analysis, response use cases β https://thehacker.news/forensics-reimagined
π±6π3
β οΈ Attackers are hijacking live web traffic by weaponizing NGINX configs linked to React2Shell exploitation.
Rogue proxy rules silently reroute user sessions through attacker infrastructureβimpacting ποΈ gov, πedu, and Asian π TLD sites.
π Details β https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
Rogue proxy rules silently reroute user sessions through attacker infrastructureβimpacting ποΈ gov, πedu, and Asian π TLD sites.
π Details β https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
π17π€6β‘4π1
β οΈ Critical RCE flaw in n8n (CVE-2026-25049, CVSS 9.4) lets authenticated users execute system commands via crafted workflow expressions.
Public webhooks exposed β remote trigger, credential theft, server takeover.
π Exploit path, affected versions, patch details β https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
Public webhooks exposed β remote trigger, credential theft, server takeover.
π Exploit path, affected versions, patch details β https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
π9π5
Passwords are sliding into legacy status.
Passkeys, AI governance, and verifiable credentials are scaling as identity shifts to real-time trust β per Rex Booth, SailPoint.
π 9 predictions reshaping identity security β https://thehackernews.com/expert-insights/2026/02/9-identity-security-predictions-for-2026.html
Passkeys, AI governance, and verifiable credentials are scaling as identity shifts to real-time trust β per Rex Booth, SailPoint.
π 9 predictions reshaping identity security β https://thehackernews.com/expert-insights/2026/02/9-identity-security-predictions-for-2026.html
π€13π6
π» Iran-linked APT Infy paused C2 ops during Iranβs Jan internet blackout β then rebuilt infrastructure as access returned.
Timing ties activity to state network controls. Latest malware uses Telegram + HTTP for dual-channel C2.
π Timeline, tooling evolution, infra rebuild β https://thehackernews.com/2026/02/infy-hackers-resume-operations-with-new.html
Timing ties activity to state network controls. Latest malware uses Telegram + HTTP for dual-channel C2.
π Timeline, tooling evolution, infra rebuild β https://thehackernews.com/2026/02/infy-hackers-resume-operations-with-new.html
π11π10
β οΈ AI is everywhere in the enterprise β SaaS, browsers, copilots, shadow tools. Visibility is years behind adoption.
Legacy controls miss real interaction points, leaving prompts, uploads, and agent workflows ungoverned.
π Download guide link β https://thehackernews.com/2026/02/the-buyers-guide-to-ai-usage-control.html
Legacy controls miss real interaction points, leaving prompts, uploads, and agent workflows ungoverned.
π Download guide link β https://thehackernews.com/2026/02/the-buyers-guide-to-ai-usage-control.html
π5
π¦β οΈ Is your container adoption outpacing your security maturity? Youβre not alone.
ActiveStateβs 2026 State of Vulnerability Management & Remediation Report found 82% of DevSecOps leaders experienced a container-related breach last year and 87% expect one in 2026.
Learn how to close the βremediation gapβ and the role AI will play in securing your stack by 2026.
π₯ Download the report β https://thn.news/container-sec-guide
ActiveStateβs 2026 State of Vulnerability Management & Remediation Report found 82% of DevSecOps leaders experienced a container-related breach last year and 87% expect one in 2026.
Learn how to close the βremediation gapβ and the role AI will play in securing your stack by 2026.
π₯ Download the report β https://thn.news/container-sec-guide
π4β‘1
π¨ ThreatsDay Bulletin is live.
This weekβs signals point to a quieter but faster threat landscape:
β’ Codespaces RCE & dev workflow abuse
β’ AI-assisted cloud intrusions
β’ BYOVD driver exploitation
β’ AsyncRAT C2 exposure
β’ Sandbox escape flaws
β’ RMM persistence campaigns
β’ Crypto drainer ecosystems
β’ Botnet & DDoS scaling ops
β’ Supply-chain injection paths
β’ APT & crimeware infra overlap
Attack paths are blending into trusted environments β cloud, identity, drivers, and developer tooling.
All updates in one place β https://thehackernews.com/2026/02/threatsday-bulletin-codespaces-rce.html
This weekβs signals point to a quieter but faster threat landscape:
β’ Codespaces RCE & dev workflow abuse
β’ AI-assisted cloud intrusions
β’ BYOVD driver exploitation
β’ AsyncRAT C2 exposure
β’ Sandbox escape flaws
β’ RMM persistence campaigns
β’ Crypto drainer ecosystems
β’ Botnet & DDoS scaling ops
β’ Supply-chain injection paths
β’ APT & crimeware infra overlap
Attack paths are blending into trusted environments β cloud, identity, drivers, and developer tooling.
All updates in one place β https://thehackernews.com/2026/02/threatsday-bulletin-codespaces-rce.html
π7
AI is foundational for security teams, but operational relief still feels out of reach.
Tines just launched Voice of Security 2026, based on insights from 1,800+ security leaders and practitioners.
The data shows why workloads remain high and what it takes to unlock real AI impact π https://thn.news/security-pro-meta-fb
Tines just launched Voice of Security 2026, based on insights from 1,800+ security leaders and practitioners.
The data shows why workloads remain high and what it takes to unlock real AI impact π https://thn.news/security-pro-meta-fb
π9
πβ οΈ AISURU/Kimwolf launched a record 31.4 Tbps HTTP DDoS attack β mitigated by Cloudflare.
Same botnet drove holiday flood campaigns as Q4 hyper-volumetric attacks surged. Runs on 2M+ infected Android devices via proxy networks.
π Read β https://thehackernews.com/2026/02/aisurukimwolf-botnet-launches-record.html
Same botnet drove holiday flood campaigns as Q4 hyper-volumetric attacks surged. Runs on 2M+ infected Android devices via proxy networks.
π Read β https://thehackernews.com/2026/02/aisurukimwolf-botnet-launches-record.html
π₯13π10β‘1
π₯ Anthropicβs Claude Opus 4.6 AI found 500+ previously unknown high-severity flaws in open-source code.
Impacted: Ghostscript, OpenSC, CGIF. Bugs ranged from buffer overflows to memory corruption β all validated and patched.
π Details β https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html
Impacted: Ghostscript, OpenSC, CGIF. Bugs ranged from buffer overflows to memory corruption β all validated and patched.
π Details β https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html
π€―21π13π€7π±6π₯2β‘1
π Malicious updates were published to official dYdX trading packages on npm and PyPI, delivering a wallet stealer and remote access malware.
Published via compromised maintainer accounts, the malware hid inside transaction-signing and wallet code.
πRead β https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html
Published via compromised maintainer accounts, the malware hid inside transaction-signing and wallet code.
πRead β https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html
π6
π‘οΈ Turn intel into action with a 6-stage Threat-Informed Defense pipeline. Map adversary TTPs, simulate attacks, validate controls, and prioritize fixes that reduce real risk.
π Download Guide (Framework steps + tooling) β https://www.linkedin.com/pulse/turn-intel-action-guide-threatinformed-defense-thehackernews-hru3c/
π Download Guide (Framework steps + tooling) β https://www.linkedin.com/pulse/turn-intel-action-guide-threatinformed-defense-thehackernews-hru3c/
π9
State-linked hackers breached 70+ government & critical infrastructure networks across 37 countries, Unit 42 reports.
Targets include law enforcement, finance ministries, and border control. Initial access via phishing loaders, with payloads staged on GitHub.
π Intrusion chain, malware design, targeting scope β https://thehackernews.com/2026/02/asian-state-backed-group-tgr-sta-1030.html
Targets include law enforcement, finance ministries, and border control. Initial access via phishing loaders, with payloads staged on GitHub.
π Intrusion chain, malware design, targeting scope β https://thehackernews.com/2026/02/asian-state-backed-group-tgr-sta-1030.html
π13π€6π3β‘1
π CISA orders federal agencies to remove unsupported edge devices within 12β18 months.
Unpatched firewalls, routers, IoT, and perimeter gear are now flagged as prime entry pointsβactively exploited by state-backed actors for network access.
π Directive scope, deadlines, device list β https://thehackernews.com/2026/02/cisa-orders-removal-of-unsupported-edge.html
Unpatched firewalls, routers, IoT, and perimeter gear are now flagged as prime entry pointsβactively exploited by state-backed actors for network access.
π Directive scope, deadlines, device list β https://thehackernews.com/2026/02/cisa-orders-removal-of-unsupported-edge.html
π10β‘2
Cisco Talos exposed DKnife β a China-linked AitM framework active since 2019 on compromised routers and edge devices.
It monitors traffic, steals credentials, and hijacks app/software updates to deploy ShadowPad and DarkNimbus on PCs and phones.
π Modules and infection chain β https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html
It monitors traffic, steals credentials, and hijacks app/software updates to deploy ShadowPad and DarkNimbus on PCs and phones.
π Modules and infection chain β https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html
π13π€―9β‘2
German authorities warn of a state-linked phishing campaign abusing Signal account features to hijack chats.
Actors pose as support, steal PINs or trick targets into device linkingβenabling message interception and impersonation across political, military, and media networks.
π Read β https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html
Actors pose as support, steal PINs or trick targets into device linkingβenabling message interception and impersonation across political, military, and media networks.
π Read β https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html
π18β‘7π±6