Category: CyberSecurityNews

Hackers Leveraging nslookup.exe to Stage Payloads via DNS Using Clickfix Attack
19
Feb
2026

Hackers Leveraging nslookup.exe to Stage Payloads via DNS Using Clickfix Attack

Clickfix Attack Using nslookup A sophisticated evolution of the ClickFix social engineering campaign, in which threat actors are now abusing…

Threat Actors Using Fake Google Forms Site to Harvest Google Logins
19
Feb
2026

Threat Actors Using Fake Google Forms Site to Harvest Google Logins

A new phishing campaign is targeting job seekers through fake Google Forms websites designed to steal login credentials. The campaign…

Link11 Launches AI Management Dashboard
19
Feb
2026

Link11 Launches AI Management Dashboard

Frankfurt am Main, Germany, February 19th, 2026, CyberNewswire Link11 launches its new “AI Management Dashboard”, closing a critical gap in…

Adidas Investigates Alleged Data Breach
19
Feb
2026

Adidas Investigates Alleged Data Breach

Adidas has confirmed it is actively investigating a potential data breach involving one of its independent third-party partners after a…

OpenClaw's #1 Skill is a Malware that Stole SSH Keys, and Opened Reverse Shells in 1,184 Packages
19
Feb
2026

OpenClaw’s #1 Skill is a Malware that Stole SSH Keys, and Opened Reverse Shells in 1,184 Packages

OpenClaw’s Top Skill Malware The most downloaded AI agent skill on OpenClaw’s ClawHub marketplace was functional malware, not a productivity…

Beyond CVE China’s Dual Vulnerability Databases Reveal a Different Disclosure Timeline
19
Feb
2026

Beyond CVE China’s Dual Vulnerability Databases Reveal a Different Disclosure Timeline

The emergence of a distinct vulnerability disclosure ecosystem within China has introduced a complex layer to the global threat landscape….

Selective Thread Emulation and Fuzzing Expose DoS Flaws in Socomec DIRIS M-70 IIoT Device
19
Feb
2026

Selective Thread Emulation and Fuzzing Expose DoS Flaws in Socomec DIRIS M-70 IIoT Device

Security researchers have uncovered six critical denial-of-service vulnerabilities in the Socomec DIRIS M-70 industrial gateway used for power monitoring and…

First Known Android AI Malware Uses Google's Gemini for Decision-making
19
Feb
2026

First Known Android AI Malware Uses Google’s Gemini for Decision-making

The first known Android malware family to weaponize a generative AI model, specifically Google’s Gemini, as part of its active…

CISA Warns of Honeywell CCTV Products Vulnerability Leads to Account Takeovers
19
Feb
2026

CISA Warns of Honeywell CCTV Products Vulnerability Leads to Account Takeovers

A critical advisory warning regarding a severe vulnerability affecting Honeywell CCTV products, published on February 17, 2026, under advisory ICSA-26-048-04….

Microsoft Defender Unveils Centralized Script Library with Copilot Analysis for Enhanced Live Response
19
Feb
2026

Microsoft Defender Unveils Centralized Script Library with Copilot Analysis for Enhanced Live Response

Microsoft Defender Centralized Script Library Microsoft has introduced a new Library Management experience in Microsoft Defender for Endpoint, designed to…

XWorm Delivered via Fake Financial Receipts Targeting Windows Systems
19
Feb
2026

XWorm Delivered via Fake Financial Receipts Targeting Windows Systems

XWorm Malware Steals Logins via Receipts A sophisticated multi-stage malware campaign is actively targeting Brazilian and Latin American (LATAM) businesses…

Hackers Leveraging Emoji Code to Hide Malicious Code and Evade Security Detections
19
Feb
2026

Hackers Leveraging Emoji Code to Hide Malicious Code and Evade Security Detections

Threat actors have begun using an obfuscation technique called emoji smuggling to hide malicious code from security systems. This attack…