ICYMI: 2026-02-19
Latest Headlines
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories
From Exposure to Exploitation: How AI Collapses Your Response Window
Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users
CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware
An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years
French Government Says 1.2 Million Bank Accounts Exposed in Breach
Nearly 1 Million User Records Compromised in Figure Data Breach
Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management
Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025
OpenClaw Security Issues Continue as SecureClaw Open Source Tool Debuts
German Rail Giant Deutsche Bahn Hit by Large-Scale DDoS Attack
Adidas Investigates Alleged Data Breach – 815,000 Records of Customer Data Stolen
OpenClaw’s Top Skill is a Malware that Stole SSH Keys and Opened Reverse Shells in 1,184 Packages
Beyond CVE China’s Dual Vulnerability Databases Reveal a Different Disclosure Timeline
AI Under Control: Link11 Launches AI Management Dashboard for Clean Traffic
Selective Thread Emulation and Fuzzing Expose DoS Flaws in Socomec DIRIS M-70 IIoT Device
PromptSpy – First Known Android AI Malware Uses Google’s Gemini for Decision-making
Threat Actors Using Fake Google Forms Site to Harvest Google Logins
CISA Warns of Honeywell CCTV Products Vulnerability Leads to Account Takeovers
Hackers Leveraging nslookup.exe to Stage Payloads via DNS Using Clickfix Attack
PromptSpy is the first known Android malware to use generative AI at runtime
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
Google blocked over 1.75 million Play Store app submissions in 2025
CISA orders feds to patch actively exploited Dell flaw within 3 days
How infostealers turn stolen credentials into real identities
Nigerian man gets eight years in prison for hacking tax firms
Texas sues TP-Link over Chinese hacking risks, user deception
Hackers target Microsoft Entra accounts in device code vishing attacks
– MTZ