ICYMI: 2026-02-17
Latest Headlines
Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates
SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer
Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations
Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta
VulnCheck Raises $25 Million in Series B Funding to Scale Vulnerability Intelligence
Cyber Insights 2026: The Ongoing Fight to Secure Industrial Control Systems
Password Managers Vulnerable to Vault Compromise Under Malicious Server
Malware in the Wild as Malicious Fork of Legitimate Triton App Surfaces on GitHub
How CISOs Can Prevent Incidents with the Right Threat Intelligence
QR Codes Used to Spread Phishing Attacks and Malicious Apps Across Mobile Devices
CredShields Contributes to OWASP’s 2026 Smart Contract Security Priorities
Cybersecurity Excellence Awards Reveal Nomination Shift from AI Hype to Governance Execution
0APT Ransomware Group Claims 200 Victims but Fails to Deliver Any Real Data
India’s Largest Pharmacy Exposes Customer Personal Details and Access to Internal Systems
Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites
Flaws in popular VSCode extensions expose developers to attacks
Chinese hackers exploiting Dell zero-day flaw since mid-2024
Notepad++ boosts update security with ‘double-lock’ mechanism
Microsoft Teams outage affects users in United States, Europe
New Keenadu backdoor found in Android firmware, Google Play apps
Poland arrests suspect linked to Phobos ransomware operation
Ireland now also investigating X over Grok-made sexual images
– MTZ