Securonix announced Sam, the AI SOC Analyst, and the Securonix Agentic Mesh, introducing a new operating model for security operations that scales analyst productivity, governs AI in production, and delivers board-ready outcomes. At a time when security operations are overwhelmed…
Microsoft Edge 145 lands with major enterprise security upgrades
Microsoft has begun rolling out Edge 145 to the Stable release channel, adding several enterprise-focused security enhancements. The update is being deployed in phases, with some features available through preview and targeted release programs. Edge 145 brings expanded data protection…
Brinqa targets manual bottlenecks in exposure management with integrated AI agents
Brinqa has advanced its platform with the introduction of two new AI agents, the AI Attribution Agent and the AI Deduplication Agent, designed to address two of the most persistent and costly problems in enterprise security, unclear asset ownership and…
China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
A suspected China-linked cyberespionage group has been covertly exploiting a critical zero-day flaw (CVE-2026-22769) in Dell’s RecoverPoint for Virtual Machines software since at least mid-2024, according to new research from Google’s threat intelligence team and Mandiant. The attackers deployed stealthy…
AI Assistants Used as Covert Command-and-Control Relays
AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication This article has been indexed from www.infosecurity-magazine.com Read the original article: AI Assistants Used as Covert Command-and-Control Relays
Paloalto to Acquire Koi Security for Establishing Agentic Endpoint security
Palo Alto Networks announced a definitive agreement to acquire Koi Security, a leading innovator in Agentic Endpoint Security, marking a major expansion of its AI‑driven defense portfolio. The move underscores Palo Alto’s commitment to securing the emerging landscape of AI-enabled endpoints. Autonomous…
MetaMask Users Targeted with Phishing Emails Containing Forged Security Report to Evade Detection
A new phishing campaign is targeting MetaMask users through carefully crafted emails that contain fake security incident reports designed to manipulate victims into compromising their accounts. The attack leverages social engineering tactics by creating a false sense of urgency around…
16 Zero-Day Vulnerabilities in Popular PDF Platforms Enable Code Execution and Data Exfiltration
16 zero-day vulnerabilities, including critical OS Command Injection, DOM-based XSS, SSRF, and Path Traversal flaws across Apryse WebViewer (formerly PDFTron) and Foxit PDF cloud services, affecting millions of enterprise users worldwide. The disclosure from Novee Security showcases its AI-augmented human-agent…
Sumo Logic Extends AWS Data Center Reach to Europe
Sumo Logic today announced it will extend the regions its security software can be accessed on the Amazon Web Services (AWS) cloud service to Europe. Cybersecurity teams will be able to run Sumo Logic software-as-a-service (SaaS) applications on the AWS…
DavaIndia Pharmacy Data Breach
DavaIndia Pharmacy recently suffered a significant security breach that compromised customer order details and granted unauthorized individuals full administrative access to their internal systems. This article has been indexed from CyberMaterial Read the original article: DavaIndia Pharmacy Data Breach
Figure Discloses Phishing Data Breach
Figure recently disclosed a security breach resulting from a social engineering attack that targeted one of its employees. This article has been indexed from CyberMaterial Read the original article: Figure Discloses Phishing Data Breach
Man Arrested Over Police Data Leak
Dutch authorities arrested a forty-year-old man in Ridderkerk after he downloaded confidential police files sent to him by mistake and attempted to extort the department for their deletion. This article has been indexed from CyberMaterial Read the original article: Man…
Luxury Brands Fined $25M In Korea
South Korea’s privacy regulator recently fined several LVMH-owned luxury brands a combined $25 million following significant data breaches that exposed millions of customers. This article has been indexed from CyberMaterial Read the original article: Luxury Brands Fined $25M In Korea
EU Parliament Blocks AI Tools
The European Parliament has deactivated integrated artificial intelligence tools on the corporate devices of its members and staff to address potential cybersecurity and data privacy risks. This article has been indexed from CyberMaterial Read the original article: EU Parliament Blocks…
Two Types of Threat Intelligence That Make Security Work
The problem isn’t that we lack threat intelligence. It’s that we lack the right kind of intelligence, intelligence that connects what’s happening inside your environment with what attackers are planning outside it. That’s why two types of threat intelligence matter:…
Your AI-generated password isn’t random, it just looks that way
Seemingly complex strings are actually highly predictable, crackable within hours Generative AI tools are surprisingly poor at suggesting strong passwords, experts say.… This article has been indexed from The Register – Security Read the original article: Your AI-generated password isn’t…
Securing OpenClaw Against”ClawHavoc”
As of February 2026, OpenClaw (formerly Clawdbot and Moltbot ) is a popular platform for autonomous AI agents. Its “sovereign” architecture, which gives AI direct access to file systems and terminals, significantly increases its attack surface—leading to elevated risks, most…
Cryptocurrency Market Slump Deepens Amid Global Tech Selloff and Risk-Off Sentiment
Now falling, the crypto market feels strain from turmoil spreading beyond tech stocks worldwide. As investors pull back sharply, digital currencies take a hit alongside firms that list Bitcoin on their books. When one part shakes, others follow –…
India Sees Rising Push for Limits on Children’s Social Media Access
A growing conversation around restricting social media access for children under 16 is gaining traction across India, with several state leaders reviewing regulatory models adopted overseas — particularly in Australia. Ministers from at least two southern states have indicated…
Cloud Range launches AI Validation Range to safely test and secure AI before deployment
Cloud Range has introduced its AI Validation Range, a secure, contained virtual cyber range that enables organizations to test, train, and validate AI models, applications, and autonomous agents without risking exposure of sensitive production data. AI adoption is accelerating faster…
The era of the Digital Parasite: Why stealth has replaced ransomware
For years, ransomware encryption functioned as the industry’s alarm bell. When systems locked up, defenders knew an attack had occurred. Not anymore. New empirical data show that attackers are actively dismantling that signal. According to Picus Security’s Red Report 2026,…
IT Security News Hourly Summary 2026-02-18 15h : 11 posts
11 posts were published in the last hour 13:32 : OpenClaw AI Framework v2026.2.17 Adds Anthropic Model Support Amid Credential Theft Bug Concerns 13:32 : Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration 13:32 : OVHcloud DNS Integration:…
OpenClaw AI Framework v2026.2.17 Adds Anthropic Model Support Amid Credential Theft Bug Concerns
OpenClaw, the open-source autonomous AI assistant that has gained widespread adoption in early 2026, released version v2026.2.17 on February 17, 2026, introducing support for Anthropic’s latest Claude Sonnet 4.6 model. The release comes amid growing security concerns after researchers documented…
Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration
Novee researchers discovered 16 vulnerabilities in Foxit and Apryse PDF tools that could have been exploited via malicious documents or URLs. The post Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration appeared first on SecurityWeek. This article has…