Category: CyberSecurityNews

Critical Authentication Bypass in better-auth API Keys Plugin Allows Unauthenticated Account Takeover
19
Feb
2026

Critical Authentication Bypass in better-auth API Keys Plugin Allows Unauthenticated Account Takeover

Authentication Bypass better-auth API Keys A critical authentication bypass vulnerability in the better-auth API keys plugin allows unauthenticated attackers to…

AI Dev Tool Cline's npm Token Hijacked by Hackers for 8 Hours
19
Feb
2026

AI Dev Tool Cline’s npm Token Hijacked by Hackers for 8 Hours

A compromised publish token gave attackers brief but concerning access to the Cline CLI npm package, exposing developers who installed…

Advanced Crypto Mining Malware Spreads Through External Drives and Air-Gapped Systems
19
Feb
2026

Advanced Crypto Mining Malware Spreads Through External Drives and Air-Gapped Systems

A sophisticated cryptocurrency mining campaign has emerged, targeting systems through external storage devices with the ability to compromise even air-gapped…

MCP Servers can be Exploited to Execute Arbitrary Code and Exfiltrate Sensitive Data
19
Feb
2026

MCP Servers can be Exploited to Execute Arbitrary Code and Exfiltrate Sensitive Data

The Model Context Protocol (MCP) emerged as a breakthrough standard in November 2024, designed by Anthropic to seamlessly connect AI…

Microsoft Teams to Prompt Mobile Users for Browser Choice with Non-Office and PDF Links
19
Feb
2026

Microsoft Teams to Prompt Mobile Users for Browser Choice with Non-Office and PDF Links

Microsoft is rolling out a significant update to Teams Mobile on Android and iOS that changes how non-Office and PDF…

OpenAI Launches EVMbench to Detect, Patch, and Exploit Vulnerabilities in Blockchain Environments
19
Feb
2026

OpenAI Launches EVMbench to Detect, Patch, and Exploit Vulnerabilities in Blockchain Environments

OpenAI EVMbench OpenAI, in collaboration with crypto investment firm Paradigm, has introduced EVMbench, a new benchmark designed to evaluate the…

Guardian Penetration Testing Tool Leverages Gemini, GPT-4 With 19 Security Tools Including Nmap and others
19
Feb
2026

Guardian Penetration Testing Tool Leverages Gemini, GPT-4 With 19 Security Tools Including Nmap and others

Guardian AI-Penetration Testing Tool A new open-source framework is reshaping how security professionals approach penetration testing by placing multiple large…

Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control
19
Feb
2026

Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control

Grok and Copilot for Malware Communication A novel attack technique that repurposes mainstream AI assistants, specifically xAI’s Grok and Microsoft…

ClickFix Abuses Legitimate Homebrew Workflow to Deploy Cuckoo Stealer on macOS for Credential Harvesting
19
Feb
2026

ClickFix Abuses Legitimate Homebrew Workflow to Deploy Cuckoo Stealer on macOS for Credential Harvesting

A sophisticated social engineering campaign is targeting macOS developers through fake Homebrew installation pages that deploy Cuckoo Stealer, a comprehensive…

Fake CAPTCHA (ClickFix) Attack Chain Leads to Enterprise‑Wide Malware Infection in Organisations
18
Feb
2026

Fake CAPTCHA (ClickFix) Attack Chain Leads to Enterprise‑Wide Malware Infection in Organisations

A sophisticated cyberattack campaign leveraging “ClickFix” social engineering has emerged, posing a severe threat to enterprise networks globally. These massive…

Cryptocurrency Scams Target Asia, Combining Malvertising and Pig Butchering with Losses Up to ¥10 Million
18
Feb
2026

Cryptocurrency Scams Target Asia, Combining Malvertising and Pig Butchering with Losses Up to ¥10 Million

A sophisticated cryptocurrency scam campaign is currently targeting users across Asia, with a heavy and specific focus on Japan. This…

Critical Ivanti EPMM Zero-Day Vulnerabilities Exploited in The Wild Targeting Corporate Networks
18
Feb
2026

Critical Ivanti EPMM Zero-Day Vulnerabilities Exploited in The Wild Targeting Corporate Networks

Two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) have emerged as a major threat to enterprise networks, with…