π Today's encryption = Tomorrow's plaintext.
Quantum is closer than you think. Master hybrid PQC, zero-trust inspection & first-to-market solutions from Zscaler.
π’ Webinar: Post-Quantum Cryptography in Action for Security Leaders
π Register now β https://thehacker.news/post-quantum-cryptography
Quantum is closer than you think. Master hybrid PQC, zero-trust inspection & first-to-market solutions from Zscaler.
π’ Webinar: Post-Quantum Cryptography in Action for Security Leaders
π Register now β https://thehacker.news/post-quantum-cryptography
β‘8π4π₯3π3
Machine identities now outnumber humans 82 to 1.
AI attackers use that sprawl to hop from dev containers to production systems in seconds, chaining minor gaps into real attack paths. Critical flaws arenβt required.
Patch cycles canβt match machine speed.
π AI-driven breach paths + CTEM response β https://thehackernews.com/2026/02/from-exposure-to-exploitation-how-ai.html
AI attackers use that sprawl to hop from dev containers to production systems in seconds, chaining minor gaps into real attack paths. Critical flaws arenβt required.
Patch cycles canβt match machine speed.
π AI-driven breach paths + CTEM response β https://thehackernews.com/2026/02/from-exposure-to-exploitation-how-ai.html
π₯11
The SANS State of ICS/OT Security 2025 Report reveals an industry advancing at two speeds.
Detection is faster, but recovery still lagsβwith one in five incidents taking over a month to restore operations.
Get the intel π https://thn.news/ics-security-25-x
Detection is faster, but recovery still lagsβwith one in five incidents taking over a month to restore operations.
Get the intel π https://thn.news/ics-security-25-x
π4π1
β οΈ Android malware now uses Gemini AI.
Researchers say PromptSpy sends screen XML to Gemini, gets JSON tap steps, and pins itself in Recent Apps to stay alive.
It then enables VNC remote access.
π Learn how the AI loop keeps it alive β https://thehackernews.com/2026/02/promptspy-android-malware-abuses-google.html
Researchers say PromptSpy sends screen XML to Gemini, gets JSON tap steps, and pins itself in Recent Apps to stay alive.
It then enables VNC remote access.
π Learn how the AI loop keeps it alive β https://thehackernews.com/2026/02/promptspy-android-malware-abuses-google.html
π5π3π€―1
π Microsoft patched a Windows Admin Center flaw enabling privilege escalation across managed systems.
CVE-2026-26119 (CVSS 8.8) stems from improper authentication and could grant rights equal to the running user.
π Read β https://thehackernews.com/2026/02/microsoft-patches-cve-2026-26119.html
CVE-2026-26119 (CVSS 8.8) stems from improper authentication and could grant rights equal to the running user.
π Read β https://thehackernews.com/2026/02/microsoft-patches-cve-2026-26119.html
π₯8π2
651 arrests across 16 African nations after an INTERPOL crackdown on online scams.
Operation Red Card 2.0 hit investment fraud, mobile loan apps, and telecom breaches. Investigators linked cases to $45M in victim losses and seized thousands of devices.
π Read β https://thehackernews.com/2026/02/interpol-operation-red-card-20-arrests.html
Operation Red Card 2.0 hit investment fraud, mobile loan apps, and telecom breaches. Investigators linked cases to $45M in victim losses and seized thousands of devices.
π Read β https://thehackernews.com/2026/02/interpol-operation-red-card-20-arrests.html
π₯13π3π€2
This weekβs ThreatsDay recap starts with core platform risk.
π OpenSSL RCE flaws
π Foxit PDF exploits
π€ Copilot DLP bypass
π¬ Enterprise email exposure
π Patches issued
π§ͺ ClickFix macOS hits
π¦ Loaders β RATs/ransomware
π Typosquat delivery chains
π 119 groups hit OT/ICS
π Supply-chain entry tactics
π LLM-made passwords
π Weak randomness patterns
π― Predictable outputs
π‘ Security workflow risk
π Complete recap β https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html
π OpenSSL RCE flaws
π Foxit PDF exploits
π€ Copilot DLP bypass
π¬ Enterprise email exposure
π Patches issued
π§ͺ ClickFix macOS hits
π¦ Loaders β RATs/ransomware
π Typosquat delivery chains
π 119 groups hit OT/ICS
π Supply-chain entry tactics
π LLM-made passwords
π Weak randomness patterns
π― Predictable outputs
π‘ Security workflow risk
π Complete recap β https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html
π8π₯3π€―3
Three former tech employees were indicted for allegedly stealing Google trade secrets and transferring them to Iran.
Prosecutors say the data involved Pixel Tensor processor security and cryptography. Files were copied, photographed, and concealed.
π Details β https://thehackernews.com/2026/02/three-former-google-engineers-indicted.html
Prosecutors say the data involved Pixel Tensor processor security and cryptography. Files were copied, photographed, and concealed.
π Details β https://thehackernews.com/2026/02/three-former-google-engineers-indicted.html
π€20π10π€―8β‘2π₯2
The FBI warns ATM βjackpottingβ caused over $20M in losses in 2025.
Since 2020, 1,900 incidents have been reported, including 700 last year. Attackers use #malware like Ploutus to bypass bank authorization via the XFS layer & trigger rapid cash-outs.
π Read β https://thehackernews.com/2026/02/fbi-reports-1900-atm-jackpotting.html
Since 2020, 1,900 incidents have been reported, including 700 last year. Attackers use #malware like Ploutus to bypass bank authorization via the XFS layer & trigger rapid cash-outs.
π Read β https://thehackernews.com/2026/02/fbi-reports-1900-atm-jackpotting.html
π23π8π±5
A 29-year-old Ukrainian was sentenced to prison for aiding North Koreaβs IT job fraud scheme.
He admitted selling stolen U.S. identities through a site seized in 2024, helping overseas workers secure jobs.
π Details β https://thehackernews.com/2026/02/ukrainian-national-sentenced-to-5-years.html
He admitted selling stolen U.S. identities through a site seized in 2024, helping overseas workers secure jobs.
π Details β https://thehackernews.com/2026/02/ukrainian-national-sentenced-to-5-years.html
π15π€―6
π‘οΈ One in three cyber-attacks starts with a compromised employee account, pushing insurers to π audit passwords, admin access, and full MFA enforcement.
Coverage now depends on proving identity risk is tightly controlled.
π Why MFA gaps can cost millions β https://thehackernews.com/2026/02/identity-cyber-scores-new-metric.html
Coverage now depends on proving identity risk is tightly controlled.
π Why MFA gaps can cost millions β https://thehackernews.com/2026/02/identity-cyber-scores-new-metric.html
π12
MIMICRAT, a new RAT, is spreading via compromised legitimate sites.
Hijacked services displayed fake Cloudflare checks, pushing a PowerShell command that disables logging and AV, then connects over HTTPS masked as analytics traffic.
π Loader stages and 22-command toolkit β https://thehackernews.com/2026/02/clickfix-campaign-abuses-compromised.html
Hijacked services displayed fake Cloudflare checks, pushing a PowerShell command that disables logging and AV, then connects over HTTPS masked as analytics traffic.
π Loader stages and 22-command toolkit β https://thehackernews.com/2026/02/clickfix-campaign-abuses-compromised.html
π12β‘1
β οΈ WARNING: Cline CLI was silently altered for 8 hours after a stolen npm token was used to publish v2.3.0 with a hidden postinstall script that installed OpenClaw.
Roughly 4,000 downloads occurred before the release was pulled & the token revoked.
π Read β https://thehackernews.com/2026/02/cline-cli-230-supply-chain-attack.html
Roughly 4,000 downloads occurred before the release was pulled & the token revoked.
π Read β https://thehackernews.com/2026/02/cline-cli-230-supply-chain-attack.html
π±12π9π€4
β οΈ A 9.9-rated Roundcube RCE flaw is now on CISAβs KEV list after confirmed active exploitation.
Researchers say attackers diffed and weaponized the bug within 48 hours. An exploit was reportedly offered for sale in June 2025.
The issue lived in the code for more than 10 years.
A second XSS flaw is also being abused.
π Read β https://thehackernews.com/2026/02/cisa-adds-two-actively-exploited.html
Researchers say attackers diffed and weaponized the bug within 48 hours. An exploit was reportedly offered for sale in June 2025.
The issue lived in the code for more than 10 years.
A second XSS flaw is also being abused.
π Read β https://thehackernews.com/2026/02/cisa-adds-two-actively-exploited.html
π7π€―3
π₯ Anthropic is rolling out Claude Code Security, an AI tool that scans full codebases and suggests patches.
In limited preview for Enterprise and Team users, it analyzes code like a human, traces data flows, and reduces false positives in a review dashboard.
All fixes require human approval.
π Learn how it works β https://thehackernews.com/2026/02/anthropic-launches-claude-code-security.html
In limited preview for Enterprise and Team users, it analyzes code like a human, traces data flows, and reduces false positives in a review dashboard.
All fixes require human approval.
π Learn how it works β https://thehackernews.com/2026/02/anthropic-launches-claude-code-security.html
π₯29π9π±7π4π€3π€―1
Generative AI traffic is up 890%, and 87% of organizations report AI-driven attacks.
EC-Council has launched four AI certifications plus Certified CISO v4 to help teams handle adoption, security, and governance as AI risk grows.
π Framework and certification details β https://thehackernews.com/2026/02/ec-council-expands-ai-certification.html
EC-Council has launched four AI certifications plus Certified CISO v4 to help teams handle adoption, security, and governance as AI risk grows.
π Framework and certification details β https://thehackernews.com/2026/02/ec-council-expands-ai-certification.html
π15π₯3π3β‘1
π¨ A financially driven actor breached 600+ FortiGate devices across 55 countries using commercial AI.
No zero-days. They scanned exposed management ports, brute-forced weak logins, accessed VPNs, ran DCSync in AD, and targeted Veeam backups.
π Details here β https://thehackernews.com/2026/02/ai-assisted-threat-actor-compromises.html
No zero-days. They scanned exposed management ports, brute-forced weak logins, accessed VPNs, ran DCSync in AD, and targeted Veeam backups.
π Details here β https://thehackernews.com/2026/02/ai-assisted-threat-actor-compromises.html
π23π₯7β‘1
β‘ Android 17 beta blocks cleartext traffic by default.
Apps targeting 17+ must define a Network Security Configuration; usesCleartextTraffic="true" alone wonβt allow HTTP. Google also adds HPKE hybrid cryptography for stronger app communications.
π Read β https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html#privacy-model-hardening
Apps targeting 17+ must define a Network Security Configuration; usesCleartextTraffic="true" alone wonβt allow HTTP. Google also adds HPKE hybrid cryptography for stronger app communications.
π Read β https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html#privacy-model-hardening
π₯29π10π5
Iranβs MuddyWater launched Operation Olalampo on Jan 26, 2026, targeting organizations across MENA.
Group-IB says phishing Office macros drop new malwareβGhostFetch, GhostBackDoor, HTTP_VIP, and the Rust backdoor CHAR.
Some variants use Telegram for control, with signs of AI-assisted development.
π Read β https://thehackernews.com/2026/02/muddywater-targets-mena-organizations.html
Group-IB says phishing Office macros drop new malwareβGhostFetch, GhostBackDoor, HTTP_VIP, and the Rust backdoor CHAR.
Some variants use Telegram for control, with signs of AI-assisted development.
π Read β https://thehackernews.com/2026/02/muddywater-targets-mena-organizations.html
π₯12π6β‘2π1
Microsoft says a Copilot bug (CW1226324) let Microsoft 365 Copilot summarize confidential emails, bypassing DLP policies.
Since Jan 21, 2026, emails in Sent Items and Drafts with sensitivity labels were processed in Copilot Chat without permission.
Microsoft fixed the issue on Feb 3 but hasnβt disclosed impact.
π Details β https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html#copilot-bypassed-dlp-safeguards
Since Jan 21, 2026, emails in Sent Items and Drafts with sensitivity labels were processed in Copilot Chat without permission.
Microsoft fixed the issue on Feb 3 but hasnβt disclosed impact.
π Details β https://thehackernews.com/2026/02/threatsday-bulletin-openssl-rce-foxit-0.html#copilot-bypassed-dlp-safeguards
π22π€―8π5π±3
π€ Researchers found 19 malicious npm packages spreading SANDWORM_MODE.
The worm π steals npm/GitHub tokens, SSH keys, API secrets, and crypto keys, then propagates using stolen identities. It also injects into AI coding tools to harvest LLM API keys.
π Read β https://thehackernews.com/2026/02/malicious-npm-packages-harvest-crypto.html
The worm π steals npm/GitHub tokens, SSH keys, API secrets, and crypto keys, then propagates using stolen identities. It also injects into AI coding tools to harvest LLM API keys.
π Read β https://thehackernews.com/2026/02/malicious-npm-packages-harvest-crypto.html
π7π€4π1