Category: CyberSecurityNews

Palo Alto Networks Completed Acquisition of Identity Security Firm CyberArk
16
Feb
2026

Palo Alto Networks Completed Acquisition of Identity Security Firm CyberArk

Palo Alto Networks and CyberArk Palo Alto Networks has finalized its acquisition of CyberArk, a leading identity security firm, in…

Noodlophile Malware Creators Evolve Tactics with Fake Job Postings and Phishing Lures
16
Feb
2026

Noodlophile Malware Creators Evolve Tactics with Fake Job Postings and Phishing Lures

The Noodlophile information stealer, originally uncovered in May 2025, has significantly evolved its attack strategies to bypass security measures. Initially,…

Beware of Fake Shops from Threat Actors to Attack Winter Olympics 2026 Fans
16
Feb
2026

Beware of Fake Shops from Threat Actors to Attack Winter Olympics 2026 Fans

Cybercriminals are targeting fans of the Milano Cortina 2026 Winter Olympics through an extensive network of fake online merchandise stores…

Joomla Novarain/Tassos Framework Vulnerabilities Enables SQL injection and Unauthenticated File Read
16
Feb
2026

Joomla Novarain/Tassos Framework Vulnerabilities Enables SQL injection and Unauthenticated File Read

Joomla Novarain/Tassos Framework Vulnerabilities Websites running the Novarain/Tassos Framework are vulnerable to critical security flaws that allow unauthenticated file read,…

Single IP Dominates Exploitation Campaign Attacking Ivanti EPMM with RCE Vulnerability
16
Feb
2026

Single IP Dominates Exploitation Campaign Attacking Ivanti EPMM with RCE Vulnerability

Single IP Dominates Ivanti EPMM with RCE Vulnerability A critical remote code execution (RCE) flaw in Ivanti Endpoint Manager Mobile…

Hackers Can Weaponize 'Summarize with AI' Buttons to Inject Memory Prompts Into AI Recommendations
16
Feb
2026

Hackers Can Weaponize ‘Summarize with AI’ Buttons to Inject Memory Prompts Into AI Recommendations

A new security threat has emerged targeting users of AI assistants through a technique called AI Recommendation Poisoning. Companies and…

New Clickfix variant 'Matryoshka' Attacking Users to Deploy macOS Stealer Malware
16
Feb
2026

New Clickfix variant ‘Matryoshka’ Attacking Users to Deploy macOS Stealer Malware

A sophisticated social engineering campaign targeting macOS users has emerged, deploying a dangerous stealer malware through an evolved version of…

LockBit’s New 5.0 Version Attacking Windows, Linux and ESXI Systems
16
Feb
2026

LockBit’s New 5.0 Version Attacking Windows, Linux and ESXI Systems

A dangerous new version of LockBit ransomware has emerged, targeting multiple operating systems and threatening businesses worldwide. LockBit 5.0, released…

Critical Airleader Vulnerability Exposes Systems to Remote Code Execution Attacks
16
Feb
2026

Critical Airleader Vulnerability Exposes Systems to Remote Code Execution Attacks

Airleader Vulnerability A newly disclosed vulnerability in an industrial control system (ICS) monitoring solution has raised concerns across multiple critical…

New ZeroDayRAT Attacking Android and iOS For Real-Time Surveillance and Data Theft
16
Feb
2026

New ZeroDayRAT Attacking Android and iOS For Real-Time Surveillance and Data Theft

ZeroDayRAT is a new mobile spyware platform sold openly through Telegram, with activity first observed on February 2, 2026. It…

CISA Warns of ZLAN ICS Devices Vulnerabilities Allows Complete Device Takeover
16
Feb
2026

CISA Warns of ZLAN ICS Devices Vulnerabilities Allows Complete Device Takeover

ZLAN ICS Devices Vulnerabilities An alert regarding two critical vulnerabilities found in ZLAN Information Technology Co.’s ZLAN5143D industrial communication device….

Lotus Blossom Hackers Compromised Official Hosting Infrastructure of Notepad++
16
Feb
2026

Lotus Blossom Hackers Compromised Official Hosting Infrastructure of Notepad++

The state-sponsored threat group Lotus Blossom successfully breached the official hosting infrastructure of Notepad++ between June and December 2025, targeting…