Dutch Police Arrest Man After Attempting to Extort Authorities Over Accidentally Leaked Data

97/69 Wednesday, February 18, 2026 Dutch authorities have arrested a 40-year-old man at his residence in Ridderkerk on charges of computer intrusion and attempted extortion. The case began after a police officer mistakenly sent the man a download link to confidential government documents instead of a link intended for uploading evidence related to a case. […]

sittisak mintaboon

February 18, 2026

New ClickFix Campaign Uses nslookup to Deliver PowerShell Payloads via DNS

96/69 Tuesday, February 17, 2026 Microsoft Threat Intelligence has identified a new variant of the ClickFix social engineering campaign that shifts from delivering malware over HTTP to using DNS as a staging channel. Victims are tricked into opening the Windows Run dialog (Win+R) and executing the nslookup command, which connects to a DNS server controlled […]

sittisak mintaboon

February 17, 2026

Google Patches First Actively Exploited Chrome Zero-Day of 2026

95/69 Tuesday, February 17, 2026 Google has released an emergency security update to address a high-severity zero-day vulnerability in the Chrome browser that has been actively exploited in the wild. The flaw, tracked as CVE-2026-2441, is a use-after-free vulnerability in Chrome’s CSS processing component. It marks the first actively exploited Chrome zero-day of 2026, following […]

sittisak mintaboon

February 17, 2026

Microsoft Releases Fix for Windows 11 Black Screen and Boot Failure Affecting Enterprise Users

94/69 Tuesday, February 17, 2026 Microsoft has announced a fix for a Windows 11 system error that caused devices to display the “UNMOUNTABLE_BOOT_VOLUME” message or become stuck on a black screen prompting a restart, preventing users from accessing their systems. The issue primarily affected commercial (enterprise) devices following the installation of security updates earlier this […]

sittisak mintaboon

February 17, 2026

CISA Urges Immediate BeyondTrust Update to Patch RCE Vulnerability Following Active Exploitation and Public PoC Release

93/69 Monday, February 16, 2026 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the BeyondTrust vulnerability CVE-2026-1731 (CVSS 9.9) to its Known Exploited Vulnerabilities (KEV) catalog after confirming evidence of active exploitation. The flaw is an OS Command Injection vulnerability affecting certain versions of BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) […]

sittisak mintaboon

February 16, 2026

Fintech Firm Figure Discloses Data Breach After Employee Falls Victim to Phishing Attack

92/69 Monday, February 16, 2026 Figure Technology Solutions, Inc., a U.S.-based fintech company that develops blockchain-powered lending platforms, has confirmed a data breach after one of its employees fell victim to a social engineering attack. As a result, threat actors were able to access and exfiltrate a limited number of company files. A company spokesperson […]

sittisak mintaboon

February 16, 2026

Over 300 Chrome Extensions Found Secretly Harvesting User Data, With More Than 37 Million Downloads

91/69 Monday, February 16, 2026 Cybersecurity researchers have identified more than 300 Google Chrome extensions exhibiting spying and data-stealing behavior, affecting users worldwide with a combined total of over 37.4 million downloads. Network traffic analysis revealed that at least 153 of these extensions begin transmitting users’ browsing history and search engine queries immediately after installation. […]

sittisak mintaboon

February 16, 2026

Google Reports Hackers Using Gemini to Develop Malware and Conduct End-to-End Cyberattacks

90/69 Friday, February 13, 2026 The Google Threat Intelligence Group (GTIG) has revealed that several state-backed hacker groups and advanced persistent threat (APT) actors have begun leveraging the Google Gemini model to support multi-stage cyberattacks. Observed activities include reconnaissance, generating phishing and social engineering content, writing and refining code, and testing target vulnerabilities. Attackers were […]

sittisak mintaboon

February 13, 2026

Ivanti Releases Patches for Multiple Endpoint Manager Vulnerabilities, Including Remote Authentication Bypass

89/69 Friday, February 13, 2026 Ivanti has released security updates to address more than ten vulnerabilities in its Endpoint Manager (EPM) product, including a critical flaw that could allow threat actors to access sensitive data without authentication. The vulnerability, tracked as CVE-2026-1603 with a CVSS score of 8.6, is an authentication bypass issue affecting Ivanti […]

sittisak mintaboon

February 13, 2026

Malware Discovered on Microsoft Store Impersonating an Add-in, Stealing Data from Over 4,000 Outlook Users

88/69 Friday, February 13, 2026 A cybersecurity monitoring center has identified a new attack vector involving a malicious add-in distributed through the Microsoft Office Store-the first incident of its kind. An application named AgreeTo, originally a legitimate meeting scheduling tool, was compromised after threat actors took control of an unused developer domain (an orphaned URL) […]

sittisak mintaboon

February 13, 2026
1 11 12 13 85