π A firmware-level Android backdoor called Keenadu is being shipped inside signed tablet builds.
Telemetry shows 13,715 users globally encountered its modules. It injects into every app via core system libraries, enabling remote control, data theft, and ad fraud.
π Read β https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html
Telemetry shows 13,715 users globally encountered its modules. It injects into every app via core system libraries, enabling remote control, data theft, and ad fraud.
π Read β https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html
π€―11π±7π€4π2
π€ AI assistants with web browsing can be weaponized as stealth command relays.
Check Point showed Copilot and Grok fetching attacker URLs and returning commands through normal responses β blending C2 traffic into enterprise use.
π Read details β https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html
Check Point showed Copilot and Grok fetching attacker URLs and returning commands through normal responses β blending C2 traffic into enterprise use.
π Read details β https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html
π€―8π7π7π2
β οΈ CISA added 4 actively exploited flaws to its KEV list, including a Chrome zero-day and critical Zimbra SSRF bug.
Attacks range from browser heap corruption to server command execution and worm delivery.
π Exploited CVEs, affected tech, patch timelines β https://thehackernews.com/2026/02/cisa-flags-four-security-flaws-under.html
Attacks range from browser heap corruption to server command execution and worm delivery.
π Exploited CVEs, affected tech, patch timelines β https://thehackernews.com/2026/02/cisa-flags-four-security-flaws-under.html
β‘7π₯3
β‘ Notepad++ pushed a security update after attackers hijacked its updater to deliver malware to select users.
Version 8.9.2 adds a βdouble lockβ verification system & hardens the auto-updater after a hosting breach enabled poisoned updates.
π Read β https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html
Version 8.9.2 adds a βdouble lockβ verification system & hardens the auto-updater after a hosting breach enabled poisoned updates.
π Read β https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html
π15π₯7π5π€―3
π¨ China-linked UNC6201 exploited a CVSS 10.0 (CVE-2026-22769) Dell RecoverPoint zero-day since 2024 using hard-coded credentials.
Access led to Tomcat web shells, BRICKSTORM installs, and newer GRIMBOLT backdoors built to evade detection.
π Read β https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html
Access led to Tomcat web shells, BRICKSTORM installs, and newer GRIMBOLT backdoors built to evade detection.
π Read β https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html
π₯12π2π2
88% of AI pilots never reach production.
Security and IT teams stall not on toolsβbut execution. Intelligent workflows blend automation, AI decisions, and human review to move phishing response, service requests, and vuln tracking from manual to real time.
π Pre-built workflow breakdowns β https://thehackernews.com/2026/02/3-ways-to-start-your-intelligent.html
Security and IT teams stall not on toolsβbut execution. Intelligent workflows blend automation, AI decisions, and human review to move phishing response, service requests, and vuln tracking from manual to real time.
π Pre-built workflow breakdowns β https://thehackernews.com/2026/02/3-ways-to-start-your-intelligent.html
π14
β οΈ Four popular VS Code extensions expose developers to file theft and remote code execution.
Researchers say 125M+ installs are affected. Flaws in Live Server, Code Runner, and others enable localhost abuse, malicious configs, and code injectionβsome still unpatched.
π Read β https://thehackernews.com/2026/02/critical-flaws-found-in-four-vs-code.html
Researchers say 125M+ installs are affected. Flaws in Live Server, Code Runner, and others enable localhost abuse, malicious configs, and code injectionβsome still unpatched.
π Read β https://thehackernews.com/2026/02/critical-flaws-found-in-four-vs-code.html
π9π€―5
Cybersecurity isnβt preparing for storms anymore. Instability is permanent.
AI threats, regulatory pressure, and geopolitical risk now shape how systems are built and runβnot just defended.
π What security looks like when volatility is baseline β https://thehackernews.com/2026/02/cybersecurity-tech-predictions-for-2026.html
AI threats, regulatory pressure, and geopolitical risk now shape how systems are built and runβnot just defended.
π What security looks like when volatility is baseline β https://thehackernews.com/2026/02/cybersecurity-tech-predictions-for-2026.html
π3
Media is too big
VIEW IN TELEGRAM
π¨ Thereβs an extreme scarcity of skilled GenAI red teamersβexperts estimate fewer than 10,000 globally, while one security industry analyst believes there are fewer than 10 capable of tackling frontier AI risks.
π½οΈ From TELUS Digital's Fuel iX team: Watch Uncharted: The AI Safety & Security Summit on demand to hear from top security leaders and industry experts as they uncover:
β’ Hidden vulnerabilities in GenAI models
β’ How automated red teaming is transforming risk detection
β’ Actionable strategies to safeguard your AI systems
π Watch now: https://thn.news/ai-security-summit-tg
π½οΈ From TELUS Digital's Fuel iX team: Watch Uncharted: The AI Safety & Security Summit on demand to hear from top security leaders and industry experts as they uncover:
β’ Hidden vulnerabilities in GenAI models
β’ How automated red teaming is transforming risk detection
β’ Actionable strategies to safeguard your AI systems
π Watch now: https://thn.news/ai-security-summit-tg
π6
Researchers found a stack overflow in Grandstream GXP1600 phones (CVE-2026-2329, 9.3 CVSS).
A crafted API request can overwrite memory and run code remotelyβno login required. Post-exploitation includes credential theft and VoIP call interception via rogue SIP proxy.
π Read β https://thehackernews.com/2026/02/grandstream-gxp1600-voip-phones-exposed.html
A crafted API request can overwrite memory and run code remotelyβno login required. Post-exploitation includes credential theft and VoIP call interception via rogue SIP proxy.
π Read β https://thehackernews.com/2026/02/grandstream-gxp1600-voip-phones-exposed.html
π5π₯3π€―1
π Citizen Lab found Cellebrite tools used on a Kenyan activistβs phone while it was in police custody.
Boniface Mwangiβs Samsung device was accessed in July 2025 and later returned without password protection. Full extraction could include messages, files, and passwords.
The findings follow similar cases in Jordan.
π Read β https://thehackernews.com/2026/02/citizen-lab-finds-cellebrite-tool-used.html
Boniface Mwangiβs Samsung device was accessed in July 2025 and later returned without password protection. Full extraction could include messages, files, and passwords.
The findings follow similar cases in Jordan.
π Read β https://thehackernews.com/2026/02/citizen-lab-finds-cellebrite-tool-used.html
π5π€―5π₯1