β‘ Google tracked multiple state groups using Gemini for vuln research, exploit debugging, and persona building across cyber operations.
One malware strain even generated second-stage code via the API, executed filelessly in memory.
π Threat actor tactics, malware, and AI abuse cases β https://thehackernews.com/2026/02/google-reports-state-backed-hackers.html
One malware strain even generated second-stage code via the API, executed filelessly in memory.
π Threat actor tactics, malware, and AI abuse cases β https://thehackernews.com/2026/02/google-reports-state-backed-hackers.html
π17π9π€4π₯2β‘1
Threat actors are actively exploiting CVE-2026-1731 (9.9) in BeyondTrust Remote Support & PRA.
Attackers extract portal data, then open WebSocket channels to trigger unauthenticated RCE.
π Read β https://thehackernews.com/2026/02/researchers-observe-in-wild.html
Patches are out, but exploitation started fast.
Attackers extract portal data, then open WebSocket channels to trigger unauthenticated RCE.
π Read β https://thehackernews.com/2026/02/researchers-observe-in-wild.html
Patches are out, but exploitation started fast.
π14π€4
npm killed long-lived tokens after the Sha1-Hulud attack, shifting to short-lived sessions and MFA by default.
Security improved β but MFA phishing and optional publish protections still leave gaps. Console access can still mean package compromise.
π Where the new model still fails β https://thehackernews.com/2026/02/npms-update-to-harden-their-supply.html
Security improved β but MFA phishing and optional publish protections still leave gaps. Console access can still mean package compromise.
π Where the new model still fails β https://thehackernews.com/2026/02/npms-update-to-harden-their-supply.html
β‘10π€―6
β οΈ Security firms uncovered coordinated abuse of Chrome extensions across business, social, and AI tools.
From Meta ad accounts to Gmail inboxes, attackers used add-ons to scrape data, inject payloads, and persist inside sessions.
π Read β https://thehackernews.com/2026/02/malicious-chrome-extensions-caught.html
From Meta ad accounts to Gmail inboxes, attackers used add-ons to scrape data, inject payloads, and persist inside sessions.
π Read β https://thehackernews.com/2026/02/malicious-chrome-extensions-caught.html
π9π9π₯6π2
π Researchers track UAT-9921 using the VoidLink modular malware framework against tech and finance targets.
The Linux-focused toolkit enables stealth persistence, scanning, and lateral movement via post-compromise C2 implants.
π Look inside the frameworkβs stealth and RBAC design β https://thehackernews.com/2026/02/uat-9921-deploys-voidlink-malware-to.html
The Linux-focused toolkit enables stealth persistence, scanning, and lateral movement via post-compromise C2 implants.
π Look inside the frameworkβs stealth and RBAC design β https://thehackernews.com/2026/02/uat-9921-deploys-voidlink-malware-to.html
π₯7
The SANS State of ICS/OT Security 2025 Report reveals an industry advancing at two speeds. Detection is faster, but recovery still lagsβwith one in five incidents taking over a month to restore operations.
Get the intel π https://thn.news/sans-ot-report
Get the intel π https://thn.news/sans-ot-report
π3π3π±1
ππ‘οΈ Google says defense contractors face sustained cyber targeting from China, Iran, North Korea, and Russia.
Campaigns span battlefield tech theft, hiring infiltration, and supply-chain breaches. Actors now focus on individuals and edge devices to bypass EDR visibility.
π Threat clusters, malware families, intrusion paths β https://thehackernews.com/2026/02/google-links-china-iran-russia-north.html
Campaigns span battlefield tech theft, hiring infiltration, and supply-chain breaches. Actors now focus on individuals and edge devices to bypass EDR visibility.
π Threat clusters, malware families, intrusion paths β https://thehackernews.com/2026/02/google-links-china-iran-russia-north.html
π₯23π9π6β‘4π€4
A newly tracked actor tied to Russian intelligence is deploying CANFAIL against Ukraine.
Targets span defense, energy, and government, with spillover into drone and nuclear research. GTIG says LLM use now supports recon, phishing, and C2 setup despite limited resources.
π Read β https://thehackernews.com/2026/02/google-ties-suspected-russian-actor-to.html
Targets span defense, energy, and government, with spillover into drone and nuclear research. GTIG says LLM use now supports recon, phishing, and C2 setup despite limited resources.
π Read β https://thehackernews.com/2026/02/google-ties-suspected-russian-actor-to.html
π16π€―9π7β‘1
β οΈ Microsoft detailed a new ClickFix variant abusing DNS lookups via nslookup to stage malware.
Victims run commands that fetch payloads from attacker-controlled resolvers, bypassing web defenses and blending into normal traffic.
Leads to RAT deployment and persistence.
π Read here β https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html
Victims run commands that fetch payloads from attacker-controlled resolvers, bypassing web defenses and blending into normal traffic.
Leads to RAT deployment and persistence.
π Read here β https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html
π₯13π€―8π€4π2
π¨ Google patched Chrome zero-day CVE-2026-2441, a CVSS 8.8 bug already exploited in attacks.
The CSS use-after-free flaw allows sandboxed remote code execution via malicious pages.
π Read β https://thehackernews.com/2026/02/new-chrome-zero-day-cve-2026-2441-under.html
First active Chrome zero-day fixed this year. Update now.
The CSS use-after-free flaw allows sandboxed remote code execution via malicious pages.
π Read β https://thehackernews.com/2026/02/new-chrome-zero-day-cve-2026-2441-under.html
First active Chrome zero-day fixed this year. Update now.
π±16π7π€3π₯2π1
Security teams have more telemetry than ever. Theyβre also falling further behind.
In a new exposure management analysis, Yochai Corem argues the gap isnβt visibility β itβs action. Attackers now scale faster than human response cycles, exploiting known exposures while remediation lags.
π From dashboards to validated fixes β https://thehackernews.com/expert-insights/2026/02/the-uncomfortable-truth-about-more.html
In a new exposure management analysis, Yochai Corem argues the gap isnβt visibility β itβs action. Attackers now scale faster than human response cycles, exploiting known exposures while remediation lags.
π From dashboards to validated fixes β https://thehackernews.com/expert-insights/2026/02/the-uncomfortable-truth-about-more.html
π10
β οΈ Researchers uncovered ZeroDayRAT, a commercial mobile spyware sold on Telegram targeting Android and iOS.
It enables live camera/mic feeds, GPS tracking, SMS and OTP theft, and wallet hijacking via a self-hosted panel β turning phones into full surveillance nodes.
π Read β https://thehackernews.com/2026/02/new-zerodayrat-mobile-spyware-enables.html
It enables live camera/mic feeds, GPS tracking, SMS and OTP theft, and wallet hijacking via a self-hosted panel β turning phones into full surveillance nodes.
π Read β https://thehackernews.com/2026/02/new-zerodayrat-mobile-spyware-enables.html
π6π3
β‘ Lithuania is investing β¬24.1M to harden its digital society against AI-era cybercrime.
The national mission links universities, industry, and government to build fraud detection, disinformation tracking, and critical infrastructure defenses as GenAI reshapes attack tactics.
π Inside the program and threat shift β https://thehackernews.com/2026/02/safe-and-inclusive-esociety-how.html
The national mission links universities, industry, and government to build fraud detection, disinformation tracking, and critical infrastructure defenses as GenAI reshapes attack tactics.
π Inside the program and threat shift β https://thehackernews.com/2026/02/safe-and-inclusive-esociety-how.html
π€2
The week in cyber:
π Add-in supply chain abuse
π§ AI in attack workflows
π Active zero-days patched
π Privileged access exploits
βοΈ Cloud infra hijacks
π€ Crypto mining botnets
π‘ IRC-based C2 returns
π οΈ PoC exploits weaponized
π Defense sector targeting
π Full Weekly Cybersecurity Recap β https://thehackernews.com/2026/02/weekly-recap-outlook-add-ins-hijack-0.html
π Add-in supply chain abuse
π§ AI in attack workflows
π Active zero-days patched
π Privileged access exploits
βοΈ Cloud infra hijacks
π€ Crypto mining botnets
π‘ IRC-based C2 returns
π οΈ PoC exploits weaponized
π Defense sector targeting
π Full Weekly Cybersecurity Recap β https://thehackernews.com/2026/02/weekly-recap-outlook-add-ins-hijack-0.html
β‘2
π A new academic study mapped password recovery attack paths across Bitwarden, LastPass, and Dashlaneβtesting zero-knowledge designs against a malicious server model.
Researchers identified 25 attack scenarios impacting vault integrity and recovery flows. No active exploitation reported.
π Research scope, attack methods and vendor fixes β https://thehackernews.com/2026/02/study-uncovers-25-password-recovery.html
Researchers identified 25 attack scenarios impacting vault integrity and recovery flows. No active exploitation reported.
π Research scope, attack methods and vendor fixes β https://thehackernews.com/2026/02/study-uncovers-25-password-recovery.html
π11