π± Apple is testing a new iOS setting that reduces how precisely cellular networks can π locate your device.
Limit Precise Location restricts location data to a broad area instead of an exact address.
π Learn how the setting works and where itβs available β https://thehackernews.com/2026/01/threatsday-bulletin-new-rces-darknet.html#cellular-location-precision-reduced
Limit Precise Location restricts location data to a broad area instead of an exact address.
π Learn how the setting works and where itβs available β https://thehackernews.com/2026/01/threatsday-bulletin-new-rces-darknet.html#cellular-location-precision-reduced
π36π15π€8β‘6π₯5
β οΈ WARNING: A supply chain attack spread malware via trusted VS Code extensions on Open VSX.
Attackers hijacked a real developer account and pushed GlassWorm through four existing tools.
22,000+ installs happened before removal.
π Read β https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html
Attackers hijacked a real developer account and pushed GlassWorm through four existing tools.
22,000+ installs happened before removal.
π Read β https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html
π8π4β‘3π€―3π±3
β οΈ ALERT β eScan antivirus delivered a malicious update after its update system was compromised.
During a two-hour window, attackers swapped a trusted file to stop updates and π οΈ cleanup. The malware hid by faking update status and downloading more payloads.
π Details β https://thehackernews.com/2026/02/escan-antivirus-update-servers.html
During a two-hour window, attackers swapped a trusted file to stop updates and π οΈ cleanup. The malware hid by faking update status and downloading more payloads.
π Details β https://thehackernews.com/2026/02/escan-antivirus-update-servers.html
π€―15π12
π WARNING - Notepad++ confirmed state-sponsored attackers hijacked its update traffic via a compromised hosting provider. Selected users were redirected to malicious update servers.
The activity ran for months.
π Learn more β https://thehackernews.com/2026/02/notepad-official-update-mechanism.html
The activity ran for months.
π Learn more β https://thehackernews.com/2026/02/notepad-official-update-mechanism.html
π€―22π±15π6π₯5π5β‘1
Experts at CTM360 report brand impersonation has become a scaled fraud operation.
Its findings show 30,000+ fake fashion stores across 80+ countries, using ads and real payment flows before disappearing.
π How the FraudWear network operates at scale β https://thehackernews.com/expert-insights/2026/02/ctm360-research-reveals-30000-fake.html
Its findings show 30,000+ fake fashion stores across 80+ countries, using ads and real payment flows before disappearing.
π How the FraudWear network operates at scale β https://thehackernews.com/expert-insights/2026/02/ctm360-research-reveals-30000-fake.html
π8
π‘οΈβοΈ Mid-market security fails when siloed tools drive up cost and alerts faster than teams can cope.
Endpoint, email, and firewall tools run in isolation, weakening protection. The shift is toward single platforms across the full threat lifecycle to cut risk without extra overhead.
π How lifecycle security works in practice β https://thehackernews.com/2026/02/securing-mid-market-across-complete.html
Endpoint, email, and firewall tools run in isolation, weakening protection. The shift is toward single platforms across the full threat lifecycle to cut risk without extra overhead.
π How lifecycle security works in practice β https://thehackernews.com/2026/02/securing-mid-market-across-complete.html
π5
Media is too big
VIEW IN TELEGRAM
What if the hardest vulnerability to patch⦠is self-doubt?
ICS environments are unforgiving. Responders canβt afford hesitationβbut they also can't ignore it. In ICS410, Justin Searle helps practitioners move from doubt to decisive action, grounded in technical precision and OT situational awareness.
Register for ICS410 at SANS Surge 2026 (Feb 23β28) and train live with Justin: https://thn.news/sans-surge-26
ICS environments are unforgiving. Responders canβt afford hesitationβbut they also can't ignore it. In ICS410, Justin Searle helps practitioners move from doubt to decisive action, grounded in technical precision and OT situational awareness.
Register for ICS410 at SANS Surge 2026 (Feb 23β28) and train live with Justin: https://thn.news/sans-surge-26
π€8
Latest edition of Cybersecurity recap worth reading:
π Proxy botnet disrupted
πͺ Office zero-day exploited
π€ AI endpoints hijacked
β‘ Power systems targeted
π§© Malware in dev tools
π§ AWS creds abused
ποΈ Databases extorted
π Enterprise flaws exploited
π Full RECAP β https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html
π Proxy botnet disrupted
πͺ Office zero-day exploited
π€ AI endpoints hijacked
β‘ Power systems targeted
π§© Malware in dev tools
π§ AWS creds abused
ποΈ Databases extorted
π Enterprise flaws exploited
π Full RECAP β https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html
π9β‘4
β‘ Microsoft will phase out NTLM in Windows through a three-step plan.
Deprecated in June 2024, NTLM remains widely used despite known security flaws. NTLM will be disabled by default in a future Windows release, with Kerberos becoming the standard.
π dtails β https://thehackernews.com/2026/02/microsoft-begins-ntlm-phase-out-with.html
Deprecated in June 2024, NTLM remains widely used despite known security flaws. NTLM will be disabled by default in a future Windows release, with Kerberos becoming the standard.
π dtails β https://thehackernews.com/2026/02/microsoft-begins-ntlm-phase-out-with.html
π₯9π€―3
π₯ A high-severity RCE flaw in OpenClaw lets attackers take over the local agent with a single click.
A crafted link can steal a gateway token via unvalidated WebSocket origins, enabling full command execution even on localhost-only setups through the userβs browser.
π Details and attack chain β https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html
A crafted link can steal a gateway token via unvalidated WebSocket origins, enabling full command execution even on localhost-only setups through the userβs browser.
π Details and attack chain β https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html
π13β‘4π4
β‘π€ Researchers find 341 malicious ClawHub skills targeting OpenClaw users via fake install steps.
The skills deploy Atomic Stealer on macOS and keylogging malware on Windows, abusing OpenClawβs open marketplace model.
π Read β https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html
The skills deploy Atomic Stealer on macOS and keylogging malware on Windows, abusing OpenClawβs open marketplace model.
π Read β https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html
π9π₯6π5π€4β‘1π€―1
π¨ China-linked Lotus Blossom compromised Notepad++ hosting infrastructure to hijack update traffic and deliver the Chrysalis backdoor, Rapid7 reports.
The issue affected older versions and was fixed with version 8.8.9 in December 2025.
π Read β https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html
The issue affected older versions and was fixed with version 8.8.9 in December 2025.
π Read β https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html
π10π€―8π₯6
π€ Mozilla will add 1-click Firefox setting to fully disable generative AI features.
With Firefox 148, users can block all current and future AI features or manage them individually, keeping AI strictly opt-in as browsers add more automation.
π Read β https://thehackernews.com/2026/02/mozilla-adds-one-click-option-to.html
With Firefox 148, users can block all current and future AI features or manage them individually, keeping AI strictly opt-in as browsers add more automation.
π Read β https://thehackernews.com/2026/02/mozilla-adds-one-click-option-to.html
π₯31π14π±4π3
πΈοΈ Exposed C2 server showed a complete BYOB botnet in the open π§
Droppers, loaders, and RATs for Windows, Linux, and macOS were publicly accessible, revealing a multi-stage chain for evasion, persistence, and control. Crypto miners were also hosted.
π Read β https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html#:~:text=Exposed%20C2%20Server%20Reveals%20BYOB%20Infrastructure
Droppers, loaders, and RATs for Windows, Linux, and macOS were publicly accessible, revealing a multi-stage chain for evasion, persistence, and control. Crypto miners were also hosted.
π Read β https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html#:~:text=Exposed%20C2%20Server%20Reveals%20BYOB%20Infrastructure
π₯6β‘3π2π€―2
π‘οΈ Russia-linked APT28 exploited a newly disclosed Microsoft Office flaw within days of disclosure.
CVE-2026-21509 was used via malicious RTF files, with geo-fenced delivery targeting Ukraine, Slovakia, and Romania.
π Read β https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html
CVE-2026-21509 was used via malicious RTF files, with geo-fenced delivery targeting Ukraine, Slovakia, and Romania.
π Read β https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html
π9π€―6π₯4
π Major cloud outages didnβt just break appsβthey broke access.
When shared cloud services fail, identity systems fail too, even if the IdP is running. Authentication depends on databases, DNS, and control planes.
π How cloud outages cascade into identity failures β https://thehackernews.com/2026/02/when-cloud-outages-ripple-across.html
When shared cloud services fail, identity systems fail too, even if the IdP is running. Authentication depends on databases, DNS, and control planes.
π How cloud outages cascade into identity failures β https://thehackernews.com/2026/02/when-cloud-outages-ripple-across.html
π4π3π€2β‘1π€―1
Want to enhance your cyber resilience with strategies and insights from industry leaders? Sign up for Infosec Compliance Now and earn up to 4 free CPE credits!
This virtual event will explore:
βοΈ Structuring AI governance programs
βοΈ Establishing continuous control monitoring
βοΈ Navigating the current cyber risk landscape
Register Now β https://thn.news/cyber-risk-summit
This virtual event will explore:
βοΈ Structuring AI governance programs
βοΈ Establishing continuous control monitoring
βοΈ Navigating the current cyber risk landscape
Register Now β https://thn.news/cyber-risk-summit
π1
π¨ Researchers detect active exploitation of a critical React Native CLI flaw.
CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.
π Read β https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.
π Read β https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
π€―5
π’ WEBINAR ALERT β Adding tools hasnβt made SOCs calmer or faster. Itβs mostly added noise.
In this session, two SOC operators walk through practical build vs buy decisions, real models, and a customer case study you can reuse.
π Join to Watch: https://thehackernews.com/2026/02/webinar-smarter-soc-blueprint-learn.html
In this session, two SOC operators walk through practical build vs buy decisions, real models, and a customer case study you can reuse.
π Join to Watch: https://thehackernews.com/2026/02/webinar-smarter-soc-blueprint-learn.html
π1π₯1
β οΈ A critical flaw in Dockerβs Ask Gordon AI let container metadata execute real commands.
A single malicious Docker LABEL could pass through the MCP gateway and run tools with user privileges. Fixed in version 4.50.0.
π DockerDash details β https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
A single malicious Docker LABEL could pass through the MCP gateway and run tools with user privileges. Fixed in version 4.50.0.
π DockerDash details β https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
π3π2