FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today — February 21st 2026Your RSS feeds

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That's according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026. "No exploitation of FortiGate

Password Managers Share a Hidden Weakness

Plus: The cybersecurity community grapples with Epstein files revelations, the US State Department plans an online anti-censorship “portal” for the world, and more.

‘Narco-Submarine’ Carrying 4 Tons of Cocaine Captured by Mexico's Navy

Following increased surveillance and patrols of routes used by transnational drug-trafficking networks, Mexican authorities have seized approximately 10 tons of cocaine in the past week alone.

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user's software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers. "It scans codebases for security vulnerabilities and suggests targeted

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-49113 (CVSS score: 9.9) - A deserialization of untrusted data vulnerability that allows remote code

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

By: Unknown
With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness. EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential Suite,

These top 30 AI agents deliver a mix of functions and autonomy

A handful hog the headlines, but many function-specific agents are available to developers and users. MIT's latest study explores the broader agentic ecosystem.

Skip the $1,500 laptop - why Mini PCs are the way to go as RAM prices skyrocket

Lenovo's IdeaCentre Mini x is a compact PC with efficient everyday performance, making it a good alternative to desktops and laptops alike.

People-search sites + adtech = potential PII leakage vector (reporting option inside)

Something I’ve been looking into: a lot of public-records / people-search sites run

Given the overlap between adtech and data brokerage, this feels like an under-discussed surface area. Consider sites like truepeoplesearch.com

submitted by /u/1pro_complainer
[link] [comments]

PayPal app code error leaked personal info and a 'few' unauthorized transactions

About 100 customers affected

PayPal has notified about 100 customers that their personal information was exposed online during a code change gone awry, and in a few of these cases, people saw unauthorized transactions on their accounts.…

Yesterday — February 20th 2026Your RSS feeds

Google Pixel 10a vs. Pixel 10: Which of Google's latest phones is best for you?

The Google Pixel 10a may not be the upgrade you expected, but it beats the more expensive Pixel 10 in a few ways.

You can control your Linux PC from your Android phone - here's how

There's no limit to the cool things you can do with KDE Connect. Here's how to get started.

AI coding assistant Cline compromised to create more OpenClaw chaos

4K unintended installs in very odd supply chain attack

Someone compromised open source AI coding assistant Cline CLI's npm package earlier this week in an odd supply chain attack that secretly installed OpenClaw on developers' machines without their knowledge. …

DHS Wants a Single Search Engine to Flag Faces and Fingerprints Across Agencies

Homeland Security aims to combine its face and fingerprint systems into one big biometric platform—after dismantling centralized privacy reviews and key limits on face recognition.

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand’s real website, and then acts as a relay between the target and the legitimate site — forwarding the victim’s username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.

There are countless phishing kits that would-be scammers can use to get started, but successfully wielding them requires some modicum of skill in configuring servers, domain names, certificates, proxy services, and other repetitive tech drudgery. Enter Starkiller, a new phishing service that dynamically loads a live copy of the real login page and records everything the user types, proxying the data from the legitimate site back to the victim.

According to an analysis of Starkiller by the security firm Abnormal AI, the service lets customers select a brand to impersonate (e.g., Apple, Facebook, Google, Microsoft et. al.) and generates a deceptive URL that visually mimics the legitimate domain while routing traffic through the attacker’s infrastructure.

For example, a phishing link targeting Microsoft customers appears as “login.microsoft.com@[malicious/shortened URL here].” The “@” sign in the link trick is an oldie but goodie, because everything before the “@” in a URL is considered username data, and the real landing page is what comes after the “@” sign. Here’s what it looks like in the target’s browser:

Image: Abnormal AI. The actual malicious landing page is blurred out in this picture, but we can see it ends in .ru. The service also offers the ability to insert links from different URL-shortening services.

Once Starkiller customers select the URL to be phished, the service spins up a Docker container running a headless Chrome browser instance that loads the real login page, Abnormal found.

“The container then acts as a man-in-the-middle reverse proxy, forwarding the end user’s inputs to the legitimate site and returning the site’s responses,” Abnormal researchers Callie Baron and Piotr Wojtyla wrote in a blog post on Thursday. “Every keystroke, form submission, and session token passes through attacker-controlled infrastructure and is logged along the way.”

Starkiller in effect offers cybercriminals real-time session monitoring, allowing them to live-stream the target’s screen as they interact with the phishing page, the researchers said.

“The platform also includes keylogger capture for every keystroke, cookie and session token theft for direct account takeover, geo-tracking of targets, and automated Telegram alerts when new credentials come in,” they wrote. “Campaign analytics round out the operator experience with visit counts, conversion rates, and performance graphs—the same kind of metrics dashboard a legitimate SaaS [software-as-a-service] platform would offer.”

Abnormal said the service also deftly intercepts and relays the victim’s MFA credentials, since the recipient who clicks the link is actually authenticating with the real site through a proxy, and any authentication tokens submitted are then forwarded to the legitimate service in real time.

“The attacker captures the resulting session cookies and tokens, giving them authenticated access to the account,” the researchers wrote. “When attackers relay the entire authentication flow in real time, MFA protections can be effectively neutralized despite functioning exactly as designed.”

The “URL Masker” feature of the Starkiller phishing service features options for configuring the malicious link. Image: Abnormal.

Starkiller is just one of several cybercrime services offered by a threat group calling itself Jinkusu, which maintains an active user forum where customers can discuss techniques, request features and troubleshoot deployments. One a-la-carte feature will harvest email addresses and contact information from compromised sessions, and advises the data can be used to build target lists for follow-on phishing campaigns.

This service strikes me as a remarkable evolution in phishing, and its apparent success is likely to be copied by other enterprising cybercriminals (assuming the service performs as well as it claims). After all, phishing users this way avoids the upfront costs and constant hassles associated with juggling multiple phishing domains, and it throws a wrench in traditional phishing detection methods like domain blocklisting and static page analysis.

It also massively lowers the barrier to entry for novice cybercriminals, Abnormal researchers observed.

“Starkiller represents a significant escalation in phishing infrastructure, reflecting a broader trend toward commoditized, enterprise-style cybercrime tooling,” their report concludes. “Combined with URL masking, session hijacking, and MFA bypass, it gives low-skill cybercriminals access to attack capabilities that were previously out of reach.”

I replaced my old Sony headphones with this $75 alternative - and I can't go back

The CMF Headphone Pro are my new pick for the best headphones under $75. Here's why.

Why AI agent containers need a syscall-level observer: the prompt injection blind spot

Hello r/netsec 👋

When an AI agent gets prompt-injected, it controls its own logs. If the injected instructions say “do this quietly,” it does it quietly. The orchestrator sees normal completions. Your observability tooling sees what the agent reports.

You need an observation point the agent cannot influence. That means going below the application layer.

Any real action in the world eventually becomes a syscall. Exfiltrating data requires connect(). Reading /etc/shadow requires open(). Spawning a shell requires execve(). The kernel does not negotiate with the agent about whether to record them.

eBPF is the right primitive here: you attach to tracepoints inside the kernel, the observed process never blocks and never detects the observer. Combined with cgroup-based filtering you can isolate exactly one container on a busy host with negligible overhead.

A compromised agent has a recognizable syscall signature: net_connect to an unexpected IP, file_open on credential files, process_exec spawning bash or curl with injected arguments. You can alert on deviations from a behavioral baseline in real time, before the exfiltration completes, regardless of what the agent reports.

I built Azazel to validate this: https://github.com/beelzebub-labs/azazel

Prompt-level defenses matter, but a deployed agent needs a layer that does not depend on the model’s cooperation. The syscall layer has always been that layer for traditional software.​​​​​​​​​​​​​​​​

submitted by /u/M4r10_h4ck
[link] [comments]

Fact-checking Google's AI Overviews just got a little easier - here's how

Both AI Overviews and AI Mode now display handy pop-up links to the original sources, so you can easily check them out to verify the AI-based information.

Metadata Exposes Authors of ICE’s ‘Mega’ Detention Center Plans

Comments and other data left on a PDF detailing Homeland Security’s proposal to build “mega” detention and processing centers reveal the personnel involved in its creation.

ShinyHunters demands $1.5M not to leak Vegas casino and resort chain data

What happens in Vegas…

Las Vegas hotel and casino giant Wynn Resorts appears to be the latest victim of data-grabbing and extortion gang ShinyHunters.…

Your Samsung Weather App Is a Fingerprint: How saved locations create a persistent cross-session tracking identifier

I analyzed 9,211 weather API requests from 42 Samsung devices over five days and found that the pre-installed Samsung Weather app generates a persistent, unique device fingerprint from saved locations - one that survives IP changes, VPN usage, and network roaming.

How it works

The Samsung Weather app polls api.weather.com on a recurring schedule for each saved location. Every request includes a placeid parameter - a 64-character hex string (consistent with SHA-256) that maps to a specific location. The combination of a user's placeid values creates a fingerprint that is effectively unique per device.

Key results

143 distinct placeid values observed across 42 devices

96.4% fingerprint uniqueness: 27 of 28 distinct fingerprints were unique to a single user. The only collision was two users tracking a single identical location.

Every user with 2+ saved locations had a globally unique fingerprint

Persistence: fingerprints survived across 8+ distinct IP addresses per user, including residential, university, and mobile carrier networks

Hardcoded API keys: the app authenticates with static keys baked into the APK - not bound to any device or session. Anyone can query the API and resolve any placeid to a physical location (city, coordinates, country) using these keys

Redundant coordinate transmission: many requests send raw GPS coordinates alongside the placeid that already encodes the same location, providing the API provider with real-time geolocation data beyond what's needed for forecasts

Who sees this data

Requests use HTTPS, so passive observers can't read placeid values. But The Weather Company (IBM) receives every request server-side, where the placeid array functions as a natural join key across a user's entire request history.

Not the first time

This is far from the first time weather apps have faced scrutiny over location data practices:

2019: LA City Attorney sued IBM/The Weather Company, alleging the Weather Channel app secretly collected continuous geolocation data and sold it to third parties for targeted advertising and hedge fund analysis. Settled August 2020.

2020-2023: Class action alleged TWC tracked users' locations "minute by minute" and sold the data. Settled April 2023.

2024: New VPPA lawsuit alleges weather.com shared PII (names, emails, precise location, video viewing data) with ad partners mParticle and AppNexus/Xandr without consent. $2,500 statutory damages per violation.

2017: Security researcher Will Strafach found AccuWeather transmitted GPS coordinates and Wi-Fi BSSID data to analytics firm Reveal Mobile even when users denied location permission.

A 2018 NYT investigation found WeatherBug shared location data with 40+ companies. A broader analysis of 20 popular weather apps found 85% gathered data for advertising and 70% harvested location data for ad targeting.

The placeid mechanism is a distinct vector: even if a user denies location permissions or uses a VPN, the saved location hashes in routine weather API calls function as a stable device fingerprint that existing consent mechanisms don't address.

Scale

Samsung ships 50-60 million phones per year in the US alone. The weather app is pre-installed and active by default. Our most active user generated 2,000+ requests over five days without any manual interaction.

submitted by /u/AdTemporary2475
[link] [comments]

I tested Google Docs' new AI audio summaries, and they're a massive time-saver

Sit back and relax while Gemini reads you the summary of a document in Google Docs.

Malicious URLs

Morning folks, will do my best to keep this concise.

Work for an MSSP, large client with many different public websites, with different OSs and different groups responsible for them.

This enquiry is about what I will call malicious URLs, invalid paths, lfi, commands in the URL; that kind of thing.

The question is, how do "we" tell (the MSSP responding to the SIEM alerts) if the webserver that received the malicious URL sent back inappropriate data, ie did the malicious URL "work".

The client will not allow us to suppress these alerts and the volume can get very high; filtering has not been particularly effective as the malicious url strings keep changing along with the source. I have never seen one of the malicious URLs even seem to work in their environment.

This has to happen to all big organizations, wondering how you all deal with it?

Thank you

submitted by /u/shawnster0
[link] [comments]

The Readiness Illusion. Why Tabletop Exercises fail without TTP Replays.

The industry has a massive gap in self-assessment. Recent data shows organizations assess their readiness at 94%, yet realistic drills show accuracy closer to 22%.

The problem is that we are siloed.

We run a TTX to satisfy a checklist, then we run a few detection tests to tune an EDR. If you aren't mapping your technical telemetry directly back to your leadership’s decision-making process, you are just guessing.

Why the combo is the Win-Win:

  • TTX (The Brain): Surfaces who freezes, which escalation paths fail, and where the "clean on paper" plan falls apart in motion.
  • TTP Replay (The Nervous System): Replays real adversarial behaviors like ransomware staging or living-off-the-land pivots to see if the SOC actually sees what they think they see.

When you pair them, you get a loop that produces sharper playbooks and cleaner telemetry. Our team at Lares broke down a practical framework for combining these two disciplines into a single narrative of proof.

Read the full post: https://www.lares.com/blog/ttx-and-ttp-replay-combo/

How is your team currently validating that your TTX assumptions match your actual detection capabilities? We're available to discuss / answer your questions in the comments.

submitted by /u/lares-hacks
[link] [comments]

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and  The vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), allows attackers to execute operating system commands in the context of the

How to change your DNS service on a Windows PC or Mac - and why you should

Switching to a different DNS provider than your ISP can offer faster performance and better security. Here how.

Need more free TV? How to stream over 100 classic cartoons for $0 - no subscription required

Tubi is adding dozens of '60s to '90s cartoons to its free lineup. Here's what you'll find.

I'm bringing my old clothes back to life with this quirky $30 device

You don't need new clothes, you need this fabric shaver to get more use out of the garments you've stopped wearing.

Ukrainian gets five years for helping North Koreans secure US tech jobs

Polish arrest leads to extradition and federal prison sentence

Ukrainian national Oleksandr Didenko will spend the next five years behind bars in the US for his involvement in helping North Korean IT workers secure fraudulent employment.…

Google Pixel 10a vs. Pixel 9a: How much of an upgrade is the new affordable phone?

The Pixel 10a debuts as the best Google offering under $500, but its toughest rival is its predecessor, the Google Pixel 9a.

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to stealthily install OpenClaw, a self-hosted autonomous AI agent that has become exceedingly popular in the past few months. "On February 17, 2026, at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI

Founder ditches AWS for Euro stack, finds sovereignty isn't plug-and-play

Attempt to go 'Made in EU' offers big tech escapees a reality check where lower cloud bills come with higher effort

Building a startup entirely on European infrastructure sounds like a nice sovereignty flex right up until you actually try it and realize the real price gets paid in time, tinkering, and slowly unlearning a decade of GitHub muscle memory.…

CISA gives federal agencies three days to patch actively exploited Dell bug

Hardcoded credential flaw in RecoverPoint already abused in espionage campaign

Uncle Sam's cyber defenders have given federal agencies just three days to patch a maximum-severity Dell bug that's been under active exploitation since at least mid-2024.…

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously undocumented remote access trojan (RAT) called MIMICRAT (aka AstarionRAT). "The campaign demonstrates a high level of operational sophistication: compromised sites spanning multiple industries and geographies serve as delivery infrastructure, a multi-stage

The best VPN services for iPhone in 2026: Expert tested and reviewed

The best iPhone VPNs combine security, privacy, speed, and the ability to unlock streaming services worldwide on your iOS handset. These services are my tried-and-tested favorites.

Get a free Pixel 10 Pro at Verizon right now - here's how

Get a Google Pixel 10 Pro for free when you sign up for a new line on a Verizon Unlimited plan. Here's how.

Ex-Google engineers accused of helping themselves to chip security secrets

Feds say trio conspired to siphon processor and cryptography IP, allegedly routing some data overseas

Two former Google engineers and a third alleged accomplice are facing federal charges after prosecutors accused them of swiping sensitive chip and security technology secrets and then trying to cover their tracks when the scheme began to unravel.…

Building CrowdStrike workflows with Claude Code skills

You can now create CrowdStrike workflows within Claude Code or your favourite \\\[SKILLS.md\\\](\[http://SKILLS.md\\\](http://SKILLS.md)) compatible editor.

$ claude

/plugin marketplace add https://github.com/eth0izzle/security-skills.git

/plugin install fusion-workflows@security-skills

/plan

"create a scheduled workflow that searches for logins of AD admins that are outside of our IP space (84.23.145.X)"

I created this to simplify workflow creation from outside the Fusion UI, which I found quite limiting so this Skill teaches Claude how to write them directly in YAML. Setup API access and it'll talk to the CrowdStrike API to fetch enabled integrations and actions within your tenant, using the correct CIDs, input/output schemas, etc. and it can test and import them directly. You can basically fully automate entire playbooks in one shot.

Read more here;

https://darkport.co.uk/blog/building-crowdstrike-workflows-with-claude-code-skills/

All open-source; https://github.com/eth0izzle/security-skills

Would love to hear any feedback! \*(or other ideas for Security Skills)\*

submitted by /u/eth0izzle
[link] [comments]

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

By: Unknown
With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when assessing cyber risk.  For many organizations, however, these assessments remain largely opaque. Elements such as password hygiene, privileged access management, and the extent of multi-factor authentication (MFA) coverage are

Attackers have 16-digit card numbers, expiry dates, but not names. Now org gets £500k fine

Appeals judge overrules lower tribunal in latest battle of ICO against a breached retail giant

The UK's data protection watchdog has scored a small win in a lengthy legal battle against a British retail group that lost millions of data records during a 2017 breach.…

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case

A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea's fraudulent information technology (IT) worker scheme. In November 2025, Oleksandr "Alexander" Didenko pleaded guilty to wire fraud conspiracy and aggravated identity theft for stealing the identities of U.S. citizens and selling them to IT workers to help them land

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of more than $20 million in 2025. The agency said 1,900 ATM jackpotting incidents have been reported since 2020, out of which 700 took place last year. In December 2025, the U.S. Department of Justice (DoJ) said about $40.73 million has been collectively

PromptSpy ushers in the era of Android threats using GenAI

ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow

Is Poshmark safe? How to buy and sell without getting scammed

Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.

Former Google Engineers Indicted Over Trade Secret Transfers to Iran

Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the search giant and other tech firms and transferring the information to unauthorized locations, including Iran. Samaneh Ghandali, 41, and her husband Mohammadjavad Khosravi (aka Mohammad Khosravi), 40, along with her sister Soroor Ghandali, 32, have been accused

Snyk CEO bails, wants someone with more AI experience to replace him

Skill at buzzword bingo also required as company seeks innovative and disruptive visionary

The CEO of code review platform provider Snyk has announced he will stand down so the company can find someone better-equipped to steer the company into the age of AI.…

New to VPNs? Everything you need to know about virtual private networks in 2026

Our step-by-step guide covers the many benefits, limited downsides, and everything else you need to know before embracing this popular privacy tool.

Jeffrey Epstein’s Ties to CBP Agents Sparked a DOJ Probe

Documents say customs officers in the US Virgin Islands had friendly relationships with Epstein years after his 2008 conviction, showing how the infamous sex offender tried to cultivate allies.

I found the best Linux server distros for your home lab

Whether you opt for bare metal servers or virtual machines, you'll need a rock-solid distro. These are my four go-to favorites.

A $10K Bounty Awaits Anyone Who Can Hack Ring Cameras to Stop Sharing Data With Amazon

The Fulu Foundation, a nonprofit that pays out bounties for removing user-hostile features, is hunting for a way to keep Ring cameras from sending data to Amazon—without breaking the hardware.

AI agents abound, unbound by rules or safety disclosures

MIT CSAIL's 2025 AI Agent Index puts opaque automated systems under the microscope

AI agents are becoming more common and more capable, without consensus or standards on how they should behave, say academic researchers.…

AI agents are fast, loose and out of control, MIT study finds

The vast majority of agentic AI systems disclose nothing about what safety testing, if any, has been conducted, and many systems have no documented way to shut down a rogue bot, a study by MIT and collaborators found.

Crims create fake remote management vendor that actually sells a RAT

$300 a month buys you a backdoor that looks like legit software

Researchers at Proofpoint late last month uncovered what they describe as a "weird twist" on the growing trend of criminals abusing remote monitoring and management software (RMM) as their preferred attack tools.…

An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years

A staffer of the Incognito dark web market was secretly controlled by the FBI—and still allegedly approved the sale of fentanyl-tainted pills, including those from a dealer linked to a confirmed death.

14 surprising ways to use your iPhone's USB-C port - beyond just charging

USB-C turns your iPhone into a hub for work, media, and storage. Sure, you can use Bluetooth, Wi-Fi, or MagSafe. But USB-C has clear advantages.
Before yesterdayYour RSS feeds

How digitally sovereign is your organization? This Red Hat tool can tell you in minutes

Red Hat's toolkit offers governments and enterprises a way to measure the control they actually have over their data, infrastructure, and operations in this era of geopolitical cloud anxiety.
❌