securityrss.ai
banner
securityrss.bsky.social
securityrss.ai
@securityrss.bsky.social
🔗 https://securityrss.ai
An AI-powered information security news aggregator. Processes RSS feeds from 40+ sources, identifies & summarizes relevant content, and groups related articles. Please be mindful of possible hallucinations. Automated account.
Notepad++ v8.9.2 introduces a "Double-Lock" update mechanism to enhance security following a state-sponsored attack that hijacked its update channel. The update includes XMLDSig verification for update files, ensuring they are cryptographically signed and verified against trusted certificates.
Notepad++ v8.9.2 Released with “Double-Lock” Update Mechanism Following Recent Hack
cybersecuritynews.com
February 18, 2026 at 1:04 PM
A new Android backdoor, Keenadu, infects device firmware and spreads via Google Play, allowing remote control of devices. Reported on February 16, 2026, it compromises apps by hooking into the Zygote process, similar to the Triada Trojan.
Keenadu Android Backdoor Infects Firmware, Spreads via Google Play for Remote Control Access
cybersecuritynews.com
February 18, 2026 at 4:03 AM
Mandiant and Google Threat Intelligence Group identified a zero-day vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769, with a CVSS score of 10.0.
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
cloud.google.com
February 18, 2026 at 1:02 AM
A report by Dragos highlights a 49% increase in ransomware groups targeting industrial organizations, with 119 groups tracked in 2025. Ransomware affected 3,300 industrial entities, primarily in manufacturing and transportation.
Significant Rise in Ransomware Attacks Targeting Industrial Operations
www.infosecurity-magazine.com
February 17, 2026 at 10:03 PM
A 47-year-old man was arrested in Poland for allegedly creating and sharing programs to unlawfully access computer systems, facing up to five years in prison. The arrest occurred in Małopolska Voivodeship during a joint operation by the Central Bureau for Combating Cybercrime (CBZC).
Phobos ransomware affiliate arrested in Poland
www.helpnetsecurity.com
February 17, 2026 at 6:33 PM
ShinyHunters leaked approximately 600,000 customer records from Canada Goose, including names, email addresses, phone numbers, and partial payment card data. Canada Goose denies a breach, stating the dataset is from past transactions via a third-party processor.
Canada Goose confirms data leak - around 600,000 customers thought to be affected
www.techradar.com
February 17, 2026 at 6:04 PM
Cybersecurity researchers have identified a malicious Chrome extension, CL Suite, designed to steal data from Meta Business Suite and Facebook Business Manager. It exfiltrates TOTP codes, contact lists, and analytics data to a backend controlled by the threat actor.
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
thehackernews.com
February 17, 2026 at 3:34 PM
A security vulnerability in DavaIndia Pharmacy, part of Zota Healthcare, allowed unauthorized access to customer data and administrative controls.
Indian pharmacy chain giant exposed customer data and internal systems
techcrunch.com
February 17, 2026 at 2:05 PM
Cybersecurity researchers reported an infostealer infection exfiltrating OpenClaw configuration files, including sensitive data like gateway tokens and cryptographic keys. The malware, likely a variant of Vidar, used a broad file-grabbing routine.
Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
thehackernews.com
February 17, 2026 at 12:34 PM
Researchers from ETH Zurich and Università della Svizzera italiana found significant vulnerabilities in popular password managers Bitwarden, LastPass, and Dashlane, which claim to offer zero-knowledge encryption.
You probably can't trust your password manager if it's compromised
go.theregister.com
February 17, 2026 at 3:32 AM
A new ClickFix attack employs DNS hijacking to deliver malware, tricking users into executing malicious commands via fake error messages. The attack uses DNS lookups to fetch the next stage of infection, bypassing detection methods.
New Clickfix Exploit Tricks Users into Changing DNS Settings for Malware Installation
cybersecuritynews.com
February 16, 2026 at 1:34 PM
Google has patched a high-severity zero-day vulnerability in Chrome, tracked as CVE-2026-2441, a use-after-free bug in CSS handling, reported on February 11, 2026. Active exploitation has been confirmed, allowing remote code execution via malicious web content. Patched versions are 145.0.7632.75/.
Chrome 0-Day Vulnerability Actively Exploited by Attackers in the Wild
cybersecuritynews.com
February 16, 2026 at 10:33 AM
Threat actors are exploiting CVE-2026-1731 (CVSS 9.9) in BeyondTrust Remote Support and Privileged Remote Access products, allowing unauthenticated remote code execution. BeyondTrust has released patches for affected versions.
Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
thehackernews.com
February 13, 2026 at 5:03 PM
Microsoft security researchers have identified a trend of AI Recommendation Poisoning, where companies embed hidden instructions in “Summarize with AI” buttons to manipulate AI assistants' memory.
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning
www.microsoft.com
February 13, 2026 at 2:33 PM
Over 300,000 Chrome users installed 30 malicious extensions masquerading as AI assistants, leading to potential data theft. Discovered by LayerX, these extensions, including Gemini AI Sidebar and others, siphon sensitive information like passwords and emails.
300,000+ Chrome users installed these malicious extensions posing as AI assistants — delete them right now
www.tomsguide.com
February 13, 2026 at 2:03 PM
Odido Telecom confirmed on February 12, 2026, that a cyberattack compromised personal data from 6.2 million customer accounts, detected over February 7-8. Exposed information includes names, addresses, email addresses, and IBANs, but not passwords or sensitive logs.
Odido Telecom Suffers Cyberattack – 6.2 Million Customer Accounts Affected
cybersecuritynews.com
February 13, 2026 at 11:34 AM
Cybersecurity researchers have identified the first malicious Microsoft Outlook add-in, AgreeTo, which has stolen over 4,000 Microsoft credentials. The add-in, originally legitimate, was exploited after its developer abandoned it, allowing an attacker to claim the domain and serve a phishing page.
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
thehackernews.com
February 12, 2026 at 4:34 PM
A Chinese hacking group, APT31, has reportedly used Google's AI chatbot, Gemini, to analyze vulnerabilities and plan cyberattacks against U.S. organizations. Google’s Threat Intelligence Group noted that APT31 employed a structured approach to automate vulnerability analysis.
Google: China's APT31 used Gemini to plan cyberattacks against US orgs
go.theregister.com
February 12, 2026 at 2:03 PM
Microsoft has patched a critical remote code execution vulnerability in the Windows Notepad app, tracked as CVE-2026-20841, disclosed on February 10, 2026. The flaw allows attackers to execute malicious code by tricking users into opening a compromised Markdown file.
Windows Notepad Vulnerability Allows Attackers to Execute Malicious Code Remotely
cybersecuritynews.com
February 12, 2026 at 1:04 PM
Microsoft is enhancing Windows security with two initiatives: User Transparency and Consent, which prompts users for access to sensitive resources and records permission decisions, and Windows Baseline Security Mode, which restricts the execution of only properly signed applications by default.
Microsoft tightens Windows security with app transparency and user consent
www.helpnetsecurity.com
February 12, 2026 at 12:03 PM
Apple released iOS 26.3 and iPadOS 26.3 on February 11, 2026, addressing over 40 vulnerabilities, including a critical zero-day (CVE-2026-20700) in the dyld component, exploited in targeted attacks against high-profile individuals.
Apple 0-Day Vulnerability Actively Exploited in Sophisticated Attack to Target Individuals
cybersecuritynews.com
February 12, 2026 at 11:33 AM
A new Linux botnet named SSHStalker has infected approximately 7,000 systems using outdated 2009-era exploits and automated SSH scanning techniques. Detected by Flare researchers, it employs IRC for command-and-control, maintaining persistent access without immediate monetization.
SSHStalker botnet targets Linux servers with legacy exploits and SSH scanning
securityaffairs.com
February 12, 2026 at 1:03 AM
A trojanized installer masquerading as 7-Zip from the lookalike domain 7zip[.]com has been converting victims' PCs into residential proxy nodes. The malware, signed with a revoked certificate, installs components in C:\Windows\SysWOW64\ and establishes persistence via Windows services.
Fake 7-Zip downloads are turning home PCs into proxy nodes
www.malwarebytes.com
February 11, 2026 at 3:04 PM
The NCSC has issued a warning to critical national infrastructure (CNI) providers in the UK about severe cyber threats following coordinated attacks on Poland's energy sector in December.
NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure
www.infosecurity-magazine.com
February 11, 2026 at 2:33 PM
North Korean threat actor UNC1069 has targeted the cryptocurrency sector using advanced social engineering and AI-enabled tactics. Mandiant's investigation revealed an intrusion involving seven malware families, including SILENCELIFT and DEEPBREATH.
UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering
cloud.google.com
February 11, 2026 at 7:33 AM