AWS coding agents gain new plugin support across development tools
AI coding assistants have become a routine part of many development workflows, helping engineers write, test, and deploy code from IDEs or command line interfaces.…
AI coding assistants have become a routine part of many development workflows, helping engineers write, test, and deploy code from IDEs or command line interfaces.…
Ravie LakshmananFeb 18, 2026Threat Intelligence / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited…
A critical zero-day vulnerability, tracked as CVE-2026-22769, is being actively exploited in Dell Technologies’ RecoverPoint for Virtual Machines. According to Mandiant and Google Threat Intelligence…
Windows Admin Center Vulnerability A critical security update addressing a high‑severity elevation of privilege vulnerability in Windows Admin Center (WAC), identified as CVE‑2026‑26119. The flaw, rated CVSS 8.8…
A new malware loader, dubbed Foxveil, that abuses trusted platforms such as Cloudflare Pages, Netlify, and Discord to stage and deliver malicious payloads while evading…
Cyber threats against the defense industrial base (DIB) are intensifying, with adversaries shifting from traditional espionage toward operations designed to disrupt production capacity and compromise…
Dragos has identified a shift from reconnaissance to operationally focused cyber activity across industrial infrastructure, alongside a sharp increase in ransomware activity affecting operational technology…
Microsoft has officially released a security update addressing a severe vulnerability found within the Windows Admin Center. Tracking under the identifier CVE-2026-26119, this critical flaw…
Enterprise security teams rely on open source across infrastructure, development pipelines, and production applications, even when they do not track it as a separate category…
Arctic Wolf has reported an 11-fold increase in data-only extortion incidents over the past year, alongside the continued dominance of ransomware, according to its 2026…
A sophisticated new malware campaign named ‘CRESCENTHARVEST’ has surfaced, strategically exploiting the geopolitical unrest in Iran to target dissidents and protest supporters. This cyberespionage operation…
AI agent frameworks are being used to automate work that involves tools, files, and external services. That type of automation creates security questions around what…