News da fonti internazionali (DARK Reading, The Hacker News, Threatpost)
- Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokensby info@thehackernews.com (The Hacker News) (The Hacker News) on 16 Febbraio 2026 at 6:43 pm
Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim’s OpenClaw (formerly Clawdbot and Moltbot) configuration environment. “This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the ‘souls’ and identities of personal AI [
- Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managersby info@thehackernews.com (The Hacker News) (The Hacker News) on 16 Febbraio 2026 at 6:06 pm
A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. “The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization,” researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said.
- Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on 16 Febbraio 2026 at 12:55 pm
This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust and rarely question. Another signal: attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supply-chain exposure are being used side by side, whichever path
- Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraudby info@thehackernews.com (The Hacker News) (The Hacker News) on 16 Febbraio 2026 at 11:55 am
Presentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’ at the Innovation Agency event ‘Innovation Breakfast: How Mission-Oriented Science and Innovation Programmes Will Address Societal Challenges’. Technologies are evolving fast, reshaping economies, governance, and daily life. Yet, as innovation accelerates, so do digital risks. Technological change is no longer
- New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theftby info@thehackernews.com (The Hacker News) (The Hacker News) on 16 Febbraio 2026 at 10:24 am
Cybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that’s being advertised on Telegram as a way to grab sensitive data and facilitate real-time surveillance on Android and iOS devices. “The developer runs dedicated channels for sales, customer support, and regular updates, giving buyers a single point of access to a fully operational spyware
- New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Releasedby info@thehackernews.com (The Hacker News) (The Hacker News) on 16 Febbraio 2026 at 6:38 am
Google on Friday released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild. The high-severity vulnerability, tracked as CVE-2026-2441 (CVSS score: 8.8), has been described as a use-after-free bug in CSS. Security researcher Shaheen Fazim has been credited with discovering and reporting the shortcoming on February 11, 2026. “Use after
- Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Stagingby info@thehackernews.com (The Hacker News) (The Hacker News) on 15 Febbraio 2026 at 2:10 pm
Microsoft has disclosed details of a new version of the ClickFix social engineering tactic in which the attackers trick unsuspecting users into running commands that carry out a Domain Name System (DNS) lookup to retrieve the next-stage payload. Specifically, the attack relies on using the “nslookup” (short for nameserver lookup) command to execute a custom DNS lookup triggered via the Windows
- Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgsby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Febbraio 2026 at 5:27 pm
A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hacking group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations within the Ukrainian regional and
- Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operationsby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Febbraio 2026 at 4:23 pm
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG). The tech giant’s threat intelligence division said the adversarial targeting of the sector is centered around four key themes: striking defense
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectorsby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Febbraio 2026 at 3:23 pm
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos. “This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity,” researchers Nick
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing Historyby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Febbraio 2026 at 11:25 am
Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes.
- npm’s Update to Harden Their Supply Chain, and Points to Considerby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Febbraio 2026 at 10:45 am
In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don’t make npm projects immune from supply-chain attacks. npm is still susceptible to malware attacks – here’s what you need to know for a safer Node community. Let’s start with the original
- Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerabilityby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Febbraio 2026 at 8:34 am
Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr. “Overnight we observed first in-the-wild exploitation of BeyondTrust across our global sensors,” Ryan Dewhurst, head of threat intelligence at watchTowr, said in a post on X. “Attackers are abusing
- Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Supportby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Febbraio 2026 at 5:57 pm
Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks. “The
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystemsby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Febbraio 2026 at 4:55 pm
Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group. The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active since May 2025. “
- ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Febbraio 2026 at 11:51 am
Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around quiet misuse of trusted tools, familiar workflows, and overlooked exposures that sit in plain sight. Another shift is how access is gained versus how it’s used. Initial entry points are getting simpler, while post-compromise
- The CTEM Divide: Why 84% of Security Programs Are Falling Behindby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Febbraio 2026 at 10:30 am
A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or industry and everything to do with a single framework decision. Organizations implementing Continuous Threat Exposure Management (CTEM) demonstrate 50% better attack surface visibility, 23-point
- 83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructureby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Febbraio 2026 at 7:32 am
A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure offered by PROSPERO. Threat intelligence firm GreyNoise said it recorded 417 exploitation sessions from 8 unique source IP addresses between February 1 and 9, 2026. An estimated 346
- Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devicesby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Febbraio 2026 at 5:39 am
Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks. The vulnerability, tracked as CVE-2026-20700 (CVSS score: 7.8), has been described as a memory corruption issue in dyld, Apple’s Dynamic Link Editor. Successful exploitation of the vulnerability could allow an
- First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentialsby info@thehackernews.com (The Hacker News) (The Hacker News) on 11 Febbraio 2026 at 5:45 pm
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been
- APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entitiesby info@thehackernews.com (The Hacker News) (The Hacker News) on 11 Febbraio 2026 at 2:52 pm
Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which are often
- Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platformsby info@thehackernews.com (The Hacker News) (The Hacker News) on 11 Febbraio 2026 at 1:28 pm
It’s Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused to bypass security features, escalate privileges, and trigger a denial-of-service (DoS) condition. Elsewhere
- Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environmentsby info@thehackernews.com (The Hacker News) (The Hacker News) on 11 Febbraio 2026 at 11:30 am
Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure by default, making them useful for learning how common attack techniques work in controlled environments. The issue is not the applications themselves, but how they are often
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Daysby info@thehackernews.com (The Hacker News) (The Hacker News) on 11 Febbraio 2026 at 10:22 am
Microsoft on Tuesday released security updates to address a set of 59 flaws across its software, including six vulnerabilities that it said have been exploited in the wild. Of the 59 flaws, five are rated Critical, 52 are rated Important, and two are rated Moderate in severity. Twenty-five of the patched vulnerabilities have been classified as privilege escalation, followed by remote code
- SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploitsby info@thehackernews.com (The Hacker News) (The Hacker News) on 11 Febbraio 2026 at 9:56 am
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. “The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizationsby info@thehackernews.com (The Hacker News) (The Hacker News) on 11 Febbraio 2026 at 6:50 am
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. “The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companiesby info@thehackernews.com (The Hacker News) (The Hacker News) on 10 Febbraio 2026 at 5:44 pm
The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a new escalation of the fraudulent scheme. “These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent
- Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Toolsby info@thehackernews.com (The Hacker News) (The Hacker News) on 10 Febbraio 2026 at 2:36 pm
Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to escalate privileges and disable Endpoint Detection
- From Ransomware to Residency: Inside the Rise of the Digital Parasiteby info@thehackernews.com (The Hacker News) (The Hacker News) on 10 Febbraio 2026 at 1:59 pm
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which analyzed over 1.1 million malicious files and mapped 15.5 million adversarial actions observed across 2025, attackers are no longer optimizing for
- Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Executionby info@thehackernews.com (The Hacker News) (The Hacker News) on 10 Febbraio 2026 at 1:30 pm
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. “An improper neutralization of special elements used in an SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiClientEMS may





























