Cyber Security
News
Germany Warns of Phishing Threats via Signal Targeting High-Profile Individuals
Mitchell Langley
February 18, 2026
Germany's cyber authorities have alerted citizens about a sophisticated phishing attack using Signal. High-ranking officials, journalists, and politicians are prime targets. This advisory emphasizes the ...
Cybersecurity
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Gabby Lee
February 18, 2026
Chinese state-backed hackers have been identified exploiting a Dell security flaw in a series of zero-day attacks since mid-2024. These attacks underline concerns regarding the ...
Cybersecurity
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
Andrew Doyle
February 18, 2026
Cybercriminals replicated a legitimate Oura MCP server in a deceptive campaign to distribute StealC malware. STAR Labs discovered the SmartLoader operation, presenting crucial cybersecurity insights.
Cybersecurity
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
Mitchell Langley
February 18, 2026
VulnCheck, a company specializing in vulnerability intelligence, has successfully raised $25 million in a Series B funding round. The investment, led by Sorenson Capital, demonstrates ...
Application Security
Notepad++ Bolsters Security With New Double-lock Update System
Mitchell Langley
February 18, 2026
After a recent supply-chain attack, Notepad++ has revamped its update mechanism with a double-lock design. This new approach is intended to tighten security and prevent ...
Cybersecurity
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Andrew Doyle
February 18, 2026
Cybersecurity experts have found methods to transform AI assistants with web capabilities into covert command-and-control (C2) tools. Such exploits could let attackers mask their activities ...
Cybersecurity
Unveiling the Extent of Leaked API Keys in Front-End Applications
Mitchell Langley
February 18, 2026
Intruder's comprehensive scan of JavaScript bundles across 5 million applications reveals a staggering number of exposed API keys, uncovering a critical security threat.
Application Security
Microsoft Teams Service Outage Frustrates Users Worldwide
Gabby Lee
February 18, 2026
Microsoft Teams has been experiencing an ongoing outage worldwide that has led to significant delays and access issues. Users are frustrated by these disruptions, with ...
News
Polish Authorities Detain Suspected Phobos Ransomware Operative
Andrew Doyle
February 18, 2026
Polish authorities have arrested a 47-year-old man suspected of participating in cybercrimes associated with the Phobos ransomware. During the operation, officers seized devices containing evidence ...
Cybersecurity
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Mitchell Langley
February 18, 2026
Hackers claim to have stolen millions of Eurail user records and are reportedly offering these for sale. Eurail is currently trying to gauge the breach's ...
Cybersecurity
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
Mitchell Langley
February 18, 2026
New research details the growing misuse of APIs by attackers leveraging machine speed and AI capabilities. Enhanced API attacks increase exposure and amplify impact, indicating ...
Cybersecurity
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
Gabby Lee
February 18, 2026
Lenovo is under scrutiny as a US law firm alleges the company breached DOJ guidelines concerning data transfers to foreign adversaries, specifically China. Lenovo has ...
Cybersecurity
New Android Malware Identified in Device Firmware Raising Alarms
Andrew Doyle
February 18, 2026
Android malware known as Keenadu has been discovered within the firmware of various brands, enabling it to breach installed apps and seize control of affected ...
Cybersecurity
Italian University Struggles With Disruption After Cyberattack
Andrew Doyle
February 17, 2026
Rome’s La Sapienza University, a key academic institution in Italy, has been grappling with severe disruptions following a significant cyberattack on February 2. This attack ...
News
The Rise of TGR-STA-1030: The Global ‘Shadow Campaigns’ Targeting Government Infrastructure
Gabby Lee
February 17, 2026
A new cyberespionage group, TGR-STA-1030/UNC6619, known for its "Shadow Campaigns," has targeted government infrastructure in 155 countries, highlighting a new global threat landscape.
Cybersecurity
DKnife Toolkit: A Persistent Threat to Network Security
Andrew Doyle
February 17, 2026
DKnife is a powerful Linux-based toolkit used by cybercriminals to hijack router traffic, allowing them to monitor and manipulate data. Discovered by Cisco Talos, it ...
Cybersecurity
Lema AI Secures $24 Million to Bolster Supply Chain Security
Mitchell Langley
February 17, 2026
Lema AI exits stealth mode, securing $24M in funding across Series A and seed rounds, aimed at advancing its supply chain security platform.
Cybersecurity
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
Gabby Lee
February 17, 2026
The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company's email system but has not disrupted critical business functions or accessed account data. ...
News
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
Mitchell Langley
February 17, 2026
With diminishing returns from data theft alone, ransomware gangs are exploring the return to data encryption for extortion. Altered tactics reflect evolving criminal strategies to ...
Cybersecurity
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
Gabby Lee
February 17, 2026
The cybersecurity startup Outtake secures $40 million in Series B funding, bringing its total funding to $60 million. This financing round aims to enhance Outtake's ...
News
Germany Warns of Phishing Threats via Signal Targeting High-Profile Individuals
Mitchell Langley
February 18, 2026
Cybersecurity
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Mitchell Langley
February 17, 2026
Cybersecurity
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
Gabby Lee
February 17, 2026
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Cybersecurity
CISA Faces Challenges With Limited Resources Amid DHS Shutdown
Andrew Doyle
February 17, 2026
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Andrew Doyle
January 28, 2026
Application Security
Microsoft Investigates Outlook Crashing on iPad Devices due to Coding Error
Andrew Doyle
January 28, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
February 18, 2026
VulnCheck, a company specializing in vulnerability intelligence, has successfully raised $25 million in a Series B funding round. The investment, led by Sorenson Capital, demonstrates ...
Notepad++ Bolsters Security With New Double-lock Update System
February 18, 2026
After a recent supply-chain attack, Notepad++ has revamped its update mechanism with a double-lock design. This new approach is intended to tighten security and prevent ...
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
February 18, 2026
Cybersecurity experts have found methods to transform AI assistants with web capabilities into covert command-and-control (C2) tools. Such exploits could let attackers mask their activities ...
Unveiling the Extent of Leaked API Keys in Front-End Applications
February 18, 2026
Intruder's comprehensive scan of JavaScript bundles across 5 million applications reveals a staggering number of exposed API keys, uncovering a critical security threat.
Microsoft Teams Service Outage Frustrates Users Worldwide
February 18, 2026
Microsoft Teams has been experiencing an ongoing outage worldwide that has led to significant delays and access issues. Users are frustrated by these disruptions, with ...
Polish Authorities Detain Suspected Phobos Ransomware Operative
February 18, 2026
Polish authorities have arrested a 47-year-old man suspected of participating in cybercrimes associated with the Phobos ransomware. During the operation, officers seized devices containing evidence ...
Millions of Eurail User Records at Stake as Hackers Threaten Sale
February 18, 2026
Hackers claim to have stolen millions of Eurail user records and are reportedly offering these for sale. Eurail is currently trying to gauge the breach's ...
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
February 18, 2026
New research details the growing misuse of APIs by attackers leveraging machine speed and AI capabilities. Enhanced API attacks increase exposure and amplify impact, indicating ...
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
February 18, 2026
Lenovo is under scrutiny as a US law firm alleges the company breached DOJ guidelines concerning data transfers to foreign adversaries, specifically China. Lenovo has ...
New Android Malware Identified in Device Firmware Raising Alarms
February 18, 2026
Android malware known as Keenadu has been discovered within the firmware of various brands, enabling it to breach installed apps and seize control of affected ...
Italian University Struggles With Disruption After Cyberattack
February 17, 2026
Rome’s La Sapienza University, a key academic institution in Italy, has been grappling with severe disruptions following a significant cyberattack on February 2. This attack ...
The Rise of TGR-STA-1030: The Global ‘Shadow Campaigns’ Targeting Government Infrastructure
February 17, 2026
A new cyberespionage group, TGR-STA-1030/UNC6619, known for its "Shadow Campaigns," has targeted government infrastructure in 155 countries, highlighting a new global threat landscape.
DKnife Toolkit: A Persistent Threat to Network Security
February 17, 2026
DKnife is a powerful Linux-based toolkit used by cybercriminals to hijack router traffic, allowing them to monitor and manipulate data. Discovered by Cisco Talos, it ...
Lema AI Secures $24 Million to Bolster Supply Chain Security
February 17, 2026
Lema AI exits stealth mode, securing $24M in funding across Series A and seed rounds, aimed at advancing its supply chain security platform.
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
February 17, 2026
The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company's email system but has not disrupted critical business functions or accessed account data. ...
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
February 17, 2026
With diminishing returns from data theft alone, ransomware gangs are exploring the return to data encryption for extortion. Altered tactics reflect evolving criminal strategies to ...
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
February 17, 2026
The cybersecurity startup Outtake secures $40 million in Series B funding, bringing its total funding to $60 million. This financing round aims to enhance Outtake's ...
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
February 17, 2026
Microsoft defender team recently uncovered a sophisticated multi-stage intrusion exploiting SolarWinds Web Help Desk instances, endangering network security by leveraging exposed web help interfaces for ...
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
February 17, 2026
Cybercriminals have crafted a counterfeit 7-Zip website, installing a trojanized version of the archiving tool that hijacks user computers as residential proxy nodes. This tactic ...
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
February 17, 2026
Zero-click prompt injection can expose sensitive data when AI agents interact with messaging apps. Attackers manipulate chat prompts to generate data-leaking URLs, leading to inadvertent ...

























