πŸ›‘οΈ Latest Cyber Security News

PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

The Hacker News β€” Thu, 19 Feb 2026 23:22:00 +0530

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

The Hacker News β€” Thu, 19 Feb 2026 23:20:00 +0530

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

The Hacker News β€” Thu, 19 Feb 2026 23:10:00 +0530

Flaw in Grandstream VoIP phones allows stealthy eavesdropping

BleepingComputer β€” Thu, 19 Feb 2026 12:16:32 -0500

Google blocked over 1.75 million Play Store app submissions in 2025

BleepingComputer β€” Thu, 19 Feb 2026 12:00:00 -0500

CISA orders feds to patch actively exploited Dell flaw within 3 days

BleepingComputer β€” Thu, 19 Feb 2026 10:30:37 -0500

How infostealers turn stolen credentials into real identities

BleepingComputer β€” Thu, 19 Feb 2026 10:05:15 -0500

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

The Hacker News β€” Thu, 19 Feb 2026 20:05:00 +0530

Nigerian man gets eight years in prison for hacking tax firms

BleepingComputer β€” Thu, 19 Feb 2026 08:51:49 -0500

Texas sues TP-Link over Chinese hacking risks, user deception

BleepingComputer β€” Thu, 19 Feb 2026 07:36:51 -0500

Hackers target Microsoft Entra accounts in device code vishing attacks

BleepingComputer β€” Thu, 19 Feb 2026 07:30:37 -0500

From Exposure to Exploitation: How AI Collapses Your Response Window

The Hacker News β€” Thu, 19 Feb 2026 17:25:00 +0530

Police arrests 651 suspects in African cybercrime crackdown

BleepingComputer β€” Thu, 19 Feb 2026 06:24:17 -0500

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

The Hacker News β€” Thu, 19 Feb 2026 15:54:00 +0530

New 'Massiv' Android banking malware poses as an IPTV app

BleepingComputer β€” Thu, 19 Feb 2026 05:00:00 -0500

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

The Hacker News β€” Thu, 19 Feb 2026 13:43:00 +0530

Critical infra Honeywell CCTVs vulnerable to auth bypass flaw

BleepingComputer β€” Wed, 18 Feb 2026 15:58:20 -0500

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

The Hacker News β€” Wed, 18 Feb 2026 23:00:00 +0530

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

The Hacker News β€” Wed, 18 Feb 2026 22:05:00 +0530

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

The Hacker News β€” Wed, 18 Feb 2026 18:46:00 +0530

Improving your response to vulnerability management

NCSC Feed β€” Mon, 09 Feb 2026 20:24:56 GMT

Can you help the NCSC with the next phase of EASM research?

NCSC Feed β€” Fri, 06 Feb 2026 10:44:36 GMT

Eradicating trivial vulnerabilities, at scale

NCSC Feed β€” Fri, 06 Feb 2026 08:11:58 GMT

Thanking the vulnerability research community with NCSC Challenge Coins

NCSC Feed β€” Fri, 06 Feb 2026 08:11:32 GMT

Cloud Security Posture Management: silver bullet or another piece in the cloud puzzle?

NCSC Feed β€” Mon, 02 Feb 2026 16:24:04 GMT

One small step for Cyber Resilience Test Facilities, one giant leap for technology assurance

NCSC Feed β€” Thu, 29 Jan 2026 13:08:58 GMT

Designing safer links: secure connectivity for operational technology

NCSC Feed β€” Wed, 14 Jan 2026 10:36:19 GMT

The Government Cyber Action Plan: strengthening resilience across the UK

NCSC Feed β€” Wed, 07 Jan 2026 13:16:03 GMT

Home working: preparing your organisation and staff

NCSC Feed β€” Wed, 17 Dec 2025 15:44:47 GMT

Data breaches: guidance for individuals and families

NCSC Feed β€” Wed, 17 Dec 2025 15:16:01 GMT