
- Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 13, 2026 at 5:27 pm
A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) […]
- Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operationsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 13, 2026 at 4:23 pm
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) […]
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectorsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 13, 2026 at 3:23 pm
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial […]
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing Historyby info@thehackernews.com (The Hacker News) (The Hacker News) on February 13, 2026 at 11:25 am
Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The […]
- npm’s Update to Harden Their Supply Chain, and Points to Considerby info@thehackernews.com (The Hacker News) (The Hacker News) on February 13, 2026 at 10:45 am
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step […]
- Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerabilityby info@thehackernews.com (The Hacker News) (The Hacker News) on February 13, 2026 at 8:34 am
Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according […]
- Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Supportby info@thehackernews.com (The Hacker News) (The Hacker News) on February 12, 2026 at 5:57 pm
Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance […]
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystemsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 12, 2026 at 4:55 pm
Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign […]
- ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on February 12, 2026 at 11:51 am
Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around […]
- The CTEM Divide: Why 84% of Security Programs Are Falling Behindby info@thehackernews.com (The Hacker News) (The Hacker News) on February 12, 2026 at 10:30 am
A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to […]
- 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructureby info@thehackernews.com (The Hacker News) (The Hacker News) on February 12, 2026 at 7:32 am
A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on […]
- Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devicesby info@thehackernews.com (The Hacker News) (The Hacker News) on February 12, 2026 at 5:39 am
Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber […]
- First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentialsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 11, 2026 at 5:45 pm
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed […]
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entitiesby info@thehackernews.com (The Hacker News) (The Hacker News) on February 11, 2026 at 2:52 pm
Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote […]
- Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platformsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 11, 2026 at 1:28 pm
It’s Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued […]
- Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environmentsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 11, 2026 at 11:30 am
Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, […]
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Daysby info@thehackernews.com (The Hacker News) (The Hacker News) on February 11, 2026 at 10:22 am
Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild. Of the […]
- SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploitsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 11, 2026 at 9:56 am
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for […]
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizationsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 11, 2026 at 6:50 am
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate […]
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companiesby info@thehackernews.com (The Hacker News) (The Hacker News) on February 10, 2026 at 5:44 pm
The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of […]
- Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Toolsby info@thehackernews.com (The Hacker News) (The Hacker News) on February 10, 2026 at 2:36 pm
Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) […]
- From Ransomware to Residency: Inside the Rise of the Digital Parasiteby info@thehackernews.com (The Hacker News) (The Hacker News) on February 10, 2026 at 1:59 pm
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening […]
- Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Executionby info@thehackernews.com (The Hacker News) (The Hacker News) on February 10, 2026 at 1:30 pm
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The […]
- ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code Securityby info@thehackernews.com (The Hacker News) (The Hacker News) on February 10, 2026 at 11:40 am
January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, […]
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Serverby info@thehackernews.com (The Hacker News) (The Hacker News) on February 10, 2026 at 10:24 am
SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on […]
