Category: SecurityNews
-
Over 500,000 VKontakte accounts hijacked through malicious Chrome extensions
Researchers said they identified a network of five Chrome extensions, marketed as tools to change themes and enhance the VK user experience, that took control of infected accounts and manipulated settings without users’ consent. First seen on therecord.media Jump to article: therecord.media/500000-vkontakte-accounts-hijacked-chrome-extensions
-
Starlink restrictions hit Russian forces as Moscow seeks workarounds
Ukraine’s security service said Russia was trying to recruit locals to help restore access to blocked Starlink satellite internet terminals. First seen on therecord.media Jump to article: therecord.media/starlink-restrictions-hit-russian-forces
-
Canada Goose ruffles feathers over 600K record dump, says leak is old news
Tags: leakFashion brand latest to succumb to ShinyHunters’ tricks First seen on theregister.com Jump to article: www.theregister.com/2026/02/16/canada_goose_shinyhunters/
-
A Misconfigured AI Could Trigger Infrastructure Collapse
AI Fumbles, Not Hackers, Pose Next Shutdown Threat by 2028: Gartner. A misconfigured artificial intelligence system could do what hackers have tried and failed to accomplish: shut down an advanced economy’s critical infrastructure. The warning centers on scenarios where AI autonomously shuts down vital services, misinterprets sensor data or triggers unsafe actions. First seen on…
-
OpenAI Snags OpenClaw Creator for Agent Push
Steinberger to Lead AI Giant’s Multi-Agent Development Team. Peter Steinberger is joining OpenAI to lead development of personal agents, culminating weeks of viral attention paid to his OpenClaw open-source artificial intelligence assistant project. Security experts dubbed it a dumpster fire after hackers were quick to add malicious functions. First seen on govinfosecurity.com Jump to article:…
-
Meeting NCSC MSP guidance a competitive advantage
Being able to meet the requirements the national body recommends is a positive for managed service providers First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366639065/Meeting-NCSC-MSP-guidance-a-competitive-advantage
-
Meeting NCSC MSP guidance a competitive advantage
Being able to meet the requirements the national body recommends is a positive for managed service providers First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366639065/Meeting-NCSC-MSP-guidance-a-competitive-advantage
-
Fake ‘Antivirus’ App Spreads Android Malware, Steals Banking Credentials
A fake Android antivirus app called TrustBastion is spreading malware and stealing banking credentials. Here’s how it works and how to stay protected. The post Fake ‘Antivirus’ App Spreads Android Malware, Steals Banking Credentials appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-fake-android-antivirus-trustbastion-malware/
-
Infostealer malware found stealing OpenClaw secrets for first time
With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/infostealer-malware-found-stealing-openclaw-secrets-for-first-time/
-
Infostealer malware found stealing OpenClaw secrets for first time
With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/infostealer-malware-found-stealing-openclaw-secrets-for-first-time/
-
Infostealer malware found stealing OpenClaw secrets for first time
With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/infostealer-malware-found-stealing-openclaw-secrets-for-first-time/
-
Operation DoppelBrand: Weaponizing Fortune 500 Brands
GS7 targets US financial institutions, among others, with near-perfect imitations of phishing portals to steal credentials, paving the way for remote access and other threat activity First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/operation-doppelbrand-weaponizing-fortune-500-brands
-
Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords
Security researchers have challenged end-to-end encryption claims from popular commercial password managers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/vulnerabilities-password-managers/
-
eco-Kommentar zur Münchner Sicherheitskonferenz 2026: Digitale Resilienz auf Basis europäischer Lösungen
Tags: resilienceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/eco-kommentar-munchner-sicherheitskonferenz-2026-digitale-resilienz-basis-europaische-loesungen
-
Dutch cops arrest man after sending him confidential files by mistake
Tags: unclassifiedBungled link handed over sensitive docs, and when recipient didn’t cooperate, police opted for cuffs First seen on theregister.com Jump to article: www.theregister.com/2026/02/16/dutch_cops_breach/
-
AI Is Making Security More Agile: Highlights from ChiBrrCon 2026
ChiBrrCon 2026 tackled AI, resilience, and operational agility in enterprise security. Learn what top speakers shared on SOC modernization and architectural risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/ai-is-making-security-more-agile-highlights-from-chibrrcon-2026/
-
You probably can’t trust your password manager if it’s compromised
Tags: passwordResearchers demo weaknesses affecting some of the most popular options First seen on theregister.com Jump to article: www.theregister.com/2026/02/16/password_managers/
-
Phishing Evolves Into Multi-Platform Fraud Systems
Bolster AI finds phishing has evolved into scalable, multi-platform fraud that hides in search, ads, and SaaS workflows. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/phishing-evolves-into-multi-platform-fraud-systems/
-
SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks, NCSC Boss Warns
ge-item”> SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks, NCSC Boss Warns First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/sme-cyber-attack-threat-ncsc/
-
OysterLoader Evolves With New C2 Infrastructure and Obfuscation
OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/oysterloader-new-c2-infrastructure/
-
Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/operation-doppelbrand-trusted/
-
ClickFix added nslookup commands to its arsenal for downloading RATs
Microsoft researchers found a ClickFix campaign that uses the nslookup tool to have users infect their own system with a Remote Access Trojan. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/clickfix-added-nslookup-commands-to-its-arsenal-for-downloading-rats/
-
A week in security (February 9 February 15)
Tags: unclassifiedA list of topics we covered in the week of February 9 to February 15 of 2026 First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/a-week-in-security-february-9-february-15/
-
Anthropic tries to hide Claude’s AI actions. Devs hate it
The software doesn’t show what files it’s working on First seen on theregister.com Jump to article: www.theregister.com/2026/02/16/anthropic_claude_ai_edits/
-
ShinyHunters leaked 600K+ Canada Goose customer records, but the firm denies it was breached
ShinyHunters leaked 600,000+ Canada Goose customer records, though the company insists its systems were not breached. Data extortion group ShinyHunters has published over 600,000 Canada Goose customer records on its data leak site. Canada Goose is a Canadian luxury outerwear company best known for high”‘end, cold”‘weather jackets and parkas. Founded in 1957 and headquartered in…
-
Why Borderless AI Is Coming to an End
Countries Are Pouring Billions Into Domestic AI Stacks to Escape US-China Dominance. By 2027, more than one-third of the world’s nations will be locked into region-specific AI platforms built on proprietary data, infrastructure and governance frameworks, according to Gartner. Nations are now safeguarding LLMs in the same way they do critical infrastructure. First seen on…
-
Passwords to passkeys: Staying ISO 27001 compliant in a passwordless era
Password-based authentication is increasingly risky as organizations adopt passkeys to strengthen security and meet ISO/IEC 27001 requirements. Passwork explains how to align passwordless adoption with Annex A controls, risk assessments, and secure implementation practices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/passwords-to-passkeys-staying-iso-27001-compliant-in-a-passwordless-era/
-
Studie von Isaca – Datenschutzbudgets werden schrumpfen
Tags: unclassifiedFirst seen on security-insider.de Jump to article: www.security-insider.de/datenschutz-budget-rueckgang-a-599ba673ec1ea9fe7c4ea204498d7a9f/
-
Warum fehlende Sichtbarkeit das größte Risiko in IT- und OT-Umgebungen ist
Konvergente Umgebungen brauchen konvergente Sicherheitsstrategien. Die erweiterte Partnerschaft von Illumio und Armis zeigt, wie sich tiefgehende Asset-Intelligence mit konsequentem Breach Containment verbinden lässt praxisnah, automatisiert und skalierbar. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/warum-fehlende-sichtbarkeit-das-groesste-risiko-in-it-und-ot-umgebungen-ist/a43748/

