Category: CyberSecurityNews

Claude Code Hacked to Achieve Full RCE and Hijacked Organization API keys
27
Feb
2026

Claude Code Hacked to Achieve Full RCE and Hijacked Organization API keys

Claude Code Hacked RCE Hijacked Organization API keys Critical vulnerabilities in Anthropic’s Claude Code, an AI-powered command-line development tool. The…

Odido Data Breach
27
Feb
2026

1 Million Records from Dutch Telco Odido Published Online After Extortion Attempt

Odido Data Breach A major data breach has hit Odido, one of the Netherlands’ prominent telecommunications providers, with cybercriminals publishing…

Google API Keys Expose Private Data Silently Through Gemini
27
Feb
2026

Google API Keys Expose Private Data Silently Through Gemini

A critical privilege escalation vulnerability affecting Google Cloud API keys specifically how legacy public-facing keys now silently grant unauthorized access…

Phishing‑Led Agent Tesla Campaign Uses Process Hollowing and Anti‑Analysis to Evade Detection
27
Feb
2026

Phishing‑Led Agent Tesla Campaign Uses Process Hollowing and Anti‑Analysis to Evade Detection

A newly uncovered phishing campaign is delivering Agent Tesla, one of the most widely used credential-stealing malware families, through a…

Steaelite RAT Fuels New Wave of Double Extortion Threats Targeting Enterprises
26
Feb
2026

Steaelite RAT Fuels New Wave of Double Extortion Threats Targeting Enterprises

A newly emerged remote access trojan (RAT) called Steaelite is raising serious concerns across enterprise security teams. First spotted on…

Wireshark 4.6.4 Released With Fix for Multiple Security Vulnerabilities
26
Feb
2026

Wireshark 4.6.4 Released With Fix for Multiple Security Vulnerabilities

The Wireshark Foundation has officially released Wireshark 4.6.4, a significant maintenance update for the world’s most popular network protocol analyzer….

1Campaign Platform Helps Attackers Bypass Google Ads Screening to Show Malicious Ads
26
Feb
2026

1Campaign Platform Helps Attackers Bypass Google Ads Screening to Show Malicious Ads

A newly uncovered cloaking platform called 1Campaign is giving cybercriminals a powerful tool to push malicious advertisements through Google’s ad review system,…

Zoom Update Scam Infected 1,437 Users to Deploy Surveillance Tools in 12 Days
26
Feb
2026

Zoom Update Scam Infected 1,437 Users to Deploy Surveillance Tools in 12 Days

A cleverly crafted fake Zoom website has silently pushed surveillance software onto Windows machines, infecting 1,437 users globally in just…

Sophisticated SeaFlower Backdoor Campaign Targets Web3 Wallets to Steal Seed Phrases
26
Feb
2026

Sophisticated SeaFlower Backdoor Campaign Targets Web3 Wallets to Steal Seed Phrases

A highly sophisticated and previously unreported threat campaign dubbed SeaFlower (藏海花) has been actively targeting users of popular Web3 cryptocurrency…

New $300 Android RAT With Automated Permission Bypass and Hidden Remote Control
26
Feb
2026

New $300 Android RAT With Automated Permission Bypass and Hidden Remote Control

A newly discovered Android Remote Access Trojan (RAT) named Oblivion is raising serious concerns across the mobile security community. Sold…

ResidentBat Android Malware Provides Belarusian KGB with Persistent Access to Mobile Devices
26
Feb
2026

ResidentBat Android Malware Provides Belarusian KGB with Persistent Access to Mobile Devices

A newly documented Android spyware called ResidentBat has been linked to the Belarusian KGB, giving state operators deep and persistent access to…

DarkCloud Infostealer Emerges as Major Threat With Scalable Credential Theft Targeting Enterprises
26
Feb
2026

DarkCloud Infostealer Emerges as Major Threat With Scalable Credential Theft Targeting Enterprises

The cybersecurity threat landscape is facing a growing challenge as infostealers continue to dominate the initial access ecosystem in 2026….