I added hover over text, it messed up some of the formatting. But whatever, I gotta go write my TPS report.
Krebs on Security
2026-02-11 - Kimwolf Botnet Swamps Anonymity Network I2P
2026-02-10 - Patch Tuesday, February 2026 Edition
Dark Reading
The Hacker News [ THN ] - Best Security Blog
2026-02-13 - Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
2026-02-13 - Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
2026-02-13 - UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
2026-02-13 - Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
2026-02-13 - npm’s Update to Harden Their Supply Chain, and Points to Consider
2026-02-13 - Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
2026-02-12 - Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
2026-02-12 - Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
2026-02-12 - ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories
2026-02-12 - The CTEM Divide: Why 84% of Security Programs Are Falling Behind
2026-02-12 - 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
2026-02-12 - Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devices
2026-02-11 - First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
2026-02-11 - APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
2026-02-11 - Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
2026-02-11 - Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
2026-02-11 - Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
2026-02-11 - SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
2026-02-11 - North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
2026-02-10 - DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
2026-02-10 - Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
2026-02-10 - From Ransomware to Residency: Inside the Rise of the Digital Parasite
2026-02-10 - Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
2026-02-10 - ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security
2026-02-10 - Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
2026-02-10 - Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data
Schneier on Security
2026-02-10 - contemplating a bill that adds surveillance to 3D printers:
New York’s 20262027 executive budget bill (S.9005 / A.10005) includes language that should alarm every maker, educator, and small manufacturer in the state. Buried in Part C is a provision requiring all 3D printers sold or delivered in New York to include “blocking technology.” This is defined as software or firmware that scans every print file through a “firearms blueprint detection algorithm” and refuses to print anything it flags as a potential firearm or firearm component...
">3D Printer Surveillance
2026-02-12 - Rewriring Democracy is on sale for $5 on Amazon, Apple Books, Barnes & Noble, Books A Million, Google Play, Kobo, and presumably everywhere else in the US. I have no idea how long this will last.
Also, Amazon has a coupon that brings the hardcover price down to $20. You’ll see the discount at checkout.
">Rewiring Democracy Ebook is on Sale
2026-02-11 - stopped accepting new submissions because so many were generated by artificial intelligence. Near as the editors could tell, many submitters pasted the magazine’s detailed story guidelines into an AI and sent in the results. And they weren’t alone. Other fiction magazines have also reported a high number of AI-generated submissions.
This is only one example of a ubiquitous trend. A legacy system relied on the difficulty of writing and cognition to limit volume. Generative AI overwhelms the system because the humans on the receiving end can’t keep up...
">AI-Generated Text and the Detection Arms Race
ThreatPost
Sydney Morning Herald
New York Times
2026-02-13 - Homeland Security Demands Social Media Sites Reveal Names Behind Anti-ICE Posts
2026-02-13 - Meta Plans to Add Facial Recognition Technology to Its Smart Glasses
2026-02-13 - Iran Turns to Digital Surveillance Tools to Track Down Protesters
2026-02-13 - ‘Something Big Is Happening’ + A.I. Rocks the Romance Novel Industry + One Good Thing
2026-02-13 - F.T.C. Chair Warns Apple Against Bias in Apple News
2026-02-12 - Anthropic Is Valued at $380 Billion in New Funding Round
2026-02-12 - Why Tech Giants Are Accused of Causing Social Media Addiction
2026-02-12 - Gail Slater Leaves Role as Justice Dept.’s Antitrust Chief
2026-02-12 - Anthropic Donates $20 Million to Super PAC Operation to Counter OpenAI
2026-02-12 - Ford Will Make a Play for a Different Battery Market
2026-02-12 - Laid-Off Battery Plant Workers Pin Blame on Ford, not Trump, for Lost Jobs
2026-02-11 - Instagram Chief Says Social Media Is Not ‘Clinically Addictive’ in Landmark Trial
2026-02-11 - OpenAI’s Biggest Challenge Is Turning Its A.I. Into a Cash Machine
2026-02-11 - Elon Musk Wants to Build an A.I. Satellite Factory on the Moon
2026-02-11 - Ford Says Electric Vehicle Losses Will Continue for 3 More Years
2026-02-10 - YouTube Argues It Isn’t Social Media in Landmark Tech Addiction Trial
2026-02-10 - A.I. Personalizes the Internet but Takes Away Control
2026-02-10 - Meta and YouTube Created ‘Digital Casinos,’ Lawyers Argue in Landmark Trial
2026-02-11 - These A.I. Dreamers Don’t Fit the Stereotype
2026-02-12 - These Mathematicians Are Putting A.I. to the Test
Wall Street Journal
BBC
2026-02-13 - John Wick game starring Keanu Reeves unveiled at PlayStation showcase
2026-02-13 - Amazon's Ring ends deal with surveillance firm after backlash
2026-02-13 - AI coding platform's flaws allow BBC reporter to be hacked
2026-02-12 - Porn site fined £800,000 for not rolling out age checks
2026-02-13 - AI safety leader says 'world is in peril' and quits to study poetry
2026-02-12 - Prince Harry thanks bereaved families taking on social media firms
2026-02-12 - Highguard game developer lays off staff just two weeks after release
2026-02-12 - Instagram boss says 16 hours of daily use is 'problematic' not addiction
2026-02-11 - Children bombarded with weight loss drug ads online, says commissioner
2026-02-10 - Apple and Google agree to change app stores after 'effective duopoly' claim
2026-02-10 - Instagram and YouTube owners built 'addiction machines', trial hears
2026-02-10 - Tech Life
2026-02-13 - Get a grip: Robotics firms struggle to develop hands
2026-02-10 - Why food fraud persists, even with improving tech
SecurityBrief AU
ITNews AU
2026-02-12 - Government entities not reporting cyber incidents to ASD
2026-02-11 - Service NSW launches Digital ID pilot
2026-02-11 - Windows Secure Boot certificates expire in June, Microsoft warns
BleepingComputer
2026-02-13 - Fake job recruiters hide malware in developer coding challenges
2026-02-13 - Claude LLM artifacts abused to push Mac infostealers in ClickFix attack
2026-02-13 - Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches
2026-02-13 - Turning IBM QRadar Alerts into Action with Criminal IP
2026-02-13 - CISA flags critical Microsoft SCCM flaw as exploited in attacks
2026-02-13 - Microsoft fixes bug that blocked Google Chrome from launching
2026-02-12 - Russia tries to block WhatsApp, Telegram in communication blockade
2026-02-12 - Bitwarden introduces ‘Cupid Vault’ for secure password sharing
2026-02-12 - Critical BeyondTrust RCE flaw now exploited in attacks, patch now
2026-02-12 - Microsoft: New Windows LNK spoofing issues aren't vulnerabilities
2026-02-12 - Romania's oil pipeline operator Conpet confirms data stolen in attack
2026-02-12 - Odido data breach exposes personal info of 6.2 million customers
2026-02-12 - WordPress plugin with 900k installs vulnerable to critical RCE flaw
2026-02-12 - AMOS infostealer targets macOS through a popular AI app
2026-02-12 - Fake AI Chrome extensions with 300K users steal credentials, emails
/r/NetSec
2026-02-13 - /u/qwerty0x41
[link] [comments]">Pwning Supercomputers - A 20yo vulnerability in Munge
2026-02-12 - /u/Shimiasm
[link] [comments]">Critical RCE Vulnerability in Unstructured.io (CVE-2025–64712) - CVSS 9.8
2026-02-12 - Over $1100 worth of prizes:
Prizes
Top performers will earn no-cost access to SANS training for further cyber skills development, including four prize categories:
The event is open to all students from participating AWS Skills to Jobs Tech Alliance institutions across the US, Latin America, Europe and Asia-Pacific regions.
submitted by /u/Successful_Clock2878
[link] [comments]">Capture the Flag (CTF) AWS/SANS
2026-02-12 - /u/EnableSecurity
[link] [comments]">TURN Security Threats: A Hacker's View
2026-02-12 - /u/Moopanger
[link] [comments]">YAML Merge Tags and More Parser Differentials
2026-02-11 - /u/FireblocksHQ
[link] [comments]">Securing Digital Assets in an Evolving Threat Landscape — analysis of DPRK/Lazarus operations, DaaS proliferation, and defense-in-depth architecture [PDF]
2026-02-10 - /u/Mindless-Study1898
[link] [comments]">I let Claude Code with 150+ offensive security MCP tools loose on my homelab
2026-02-10 - /u/TroubleNo3411
[link] [comments]">Adbleed: partially de-anonymizing VPN users with adblock filter lists
2026-02-10 - /u/x0zayl
[link] [comments]">Confused Deputy Problem – How to Hack Cloud Integrations
2026-02-10 - In an attempt to sharpen my hardware hacking skills, I took on the challenge of extracting firmware off a flip phone 📱.
But... I kind of underestimated my opponent:
- No trace of the firmware online
- No OTA updates
- Debug interface nowhere to be found
- The chip holding the firmware has no legs
Quite the challenge.
I ended up dead-bugging the chip and wiring it to the Xgecu T48 Flash programmer.
Enjoy!
submitted by /u/fatpengoo
[link] [comments]">No Legs, No Problem: Dumping BGA MCP NAND Flash
2026-02-10 - /u/bagaudin
[link] [comments]">LOTUSLITE: Targeted espionage leveraging geopolitical themes
2026-02-10 - /u/netbiosX
[link] [comments]">GAC Hijacking
2026-02-10 - /u/jakozaur
[link] [comments]">We hid backdoors in binaries — Opus 4.6 found 49% of them
/r/InfoSecNews
2026-02-13 -
submitted by /u/quellaman [link] [comments] | ">Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release
2026-02-13 -
submitted by /u/quellaman [link] [comments] | ">Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
2026-02-13 -
submitted by /u/quellaman [link] [comments] | ">Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
2026-02-13 -
submitted by /u/quellaman [link] [comments] | ">Russia tries to block WhatsApp, Telegram in communication blockade
2026-02-13 -
submitted by /u/quellaman [link] [comments] | ">Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
2026-02-13 -
submitted by /u/quellaman [link] [comments] | ">Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
2026-02-13 -
submitted by /u/quellaman [link] [comments] | ">U.S. CISA adds SolarWinds Web Help Desk, Notepad++, Microsoft Configuration Manager, and Apple devices flaws to its Known Exploited Vulnerabilities catalog
2026-02-12 -
submitted by /u/quellaman [link] [comments] | ">Odido data breach exposes personal info of 6.2 million customers
2026-02-12 -
submitted by /u/quellaman [link] [comments] | ">Google says hackers are abusing Gemini AI for all attacks stages
2026-02-12 -
submitted by /u/quellaman [link] [comments] | ">ApolloMD data breach impacts 626,540 people
2026-02-12 -
submitted by /u/quellaman [link] [comments] | ">Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
2026-02-12 -
submitted by /u/quellaman [link] [comments] | ">83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
2026-02-12 -
submitted by /u/quellaman [link] [comments] | ">Apple fixed first actively exploited zero-day in 2026
2026-02-11 -
submitted by /u/quellaman [link] [comments] | ">U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog
2026-02-11 - /u/quellaman
[link] [comments]">Kimwolf Botnet Swamps Anonymity Network I2P
2026-02-11 -
submitted by /u/quellaman [link] [comments] | ">North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms
2026-02-11 -
submitted by /u/quellaman [link] [comments] | ">LummaStealer infections surge after CastleLoader malware campaigns
2026-02-11 -
submitted by /u/quellaman [link] [comments] | ">Reynolds ransomware uses BYOVD to disable security before encryption
2026-02-11 -
submitted by /u/quellaman [link] [comments] | ">North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
2026-02-11 -
submitted by /u/quellaman [link] [comments] | ">SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
2026-02-11 - /u/quellaman
[link] [comments]">Prompt Injection Road Signs
2026-02-10 -
submitted by /u/jamessonnycrockett [link] [comments] | ">New Cybercrime Group 0APT Accused of Faking Hundreds of Breach Claims
2026-02-10 -
submitted by /u/quellaman [link] [comments] | ">EFFecting Change: Get the Flock Out of Our City
2026-02-10 -
submitted by /u/jamessonnycrockett [link] [comments] | ">Pride Month Phishing Targets Employees Worldwide via Trusted Email Services
2026-02-10 -
submitted by /u/EsbenD_Lansweeper [link] [comments] | ">Microsoft Patch Tuesday – February 2026