In 2026, compliance sits at the intersection of AI adoption, expanding privacy regulations, and rising cybersecurity risk. As regulatory expectations tighten and digital systems grow more complex, organizations are under. The post 150+ Key Compliance Statistics: AI, Data Privacy, Cybersecurity…
IT Security News Hourly Summary 2026-02-13 09h : 8 posts
8 posts were published in the last hour 7:31 : Enforcing piracy policy earned helpdesk worker death threats 7:31 : Ubuntu 24.04.4 LTS arrives with cumulative security and bug fixes 7:31 : Arctic Wolf expands MSP Security with Aurora Managed…
Enforcing piracy policy earned helpdesk worker death threats
Years later, he read about his antagonist doing time for murder On Call Welcome to another installment of On Call, The Register’s weekly reader-contributed column that tells your tech support tales.… This article has been indexed from The Register –…
Ubuntu 24.04.4 LTS arrives with cumulative security and bug fixes
Security teams running Ubuntu in production often delay major OS upgrades until the next point release arrives with accumulated patches and newer hardware support. Ubuntu 24.04.4 LTS is now available as refreshed installation media for Noble Numbat, bundling the latest…
Arctic Wolf expands MSP Security with Aurora Managed Endpoint Defense
Arctic Wolf has announced new endpoint security capabilities for its Managed Service Provider (MSP) partners. The addition of Aurora Managed Endpoint Defense, powered by the Arctic Wolf Aurora Platform, enables partners to deliver stronger customer protection, streamline service delivery, and…
UK’s Digital ID U-Turn: What It Means for Security
The UK government has quietly backed away from one of its most controversial policies. Making a national digital ID mandatory for anyone who wants to… The post UK’s Digital ID U-Turn: What It Means for Security appeared first on Panda…
next-mdx-remote Vulnerability Allows Arbitrary Code Execution in React SSR
A security vulnerability has been discovered in next-mdx-remote, a popular TypeScript library used for rendering MDX content in React applications. The flaw, tracked as CVE-2026-0969 and identified by researchers at Sejong University, enables attackers to execute arbitrary code on servers…
AI-Driven Phishing and QR Code Quishing Surge in 2025 Spam and Phishing Report
The 2025 spam and phishing landscape shows a sharp rise in AI-generated lures and QR code–based “quishing,” alongside complex malware campaigns abusing cracked games and software to deliver information stealers at scale. These trends highlight how social engineering and multi‑stage…
China Revives Tianfu Cup Hacking Contest Under Increased Secrecy
Rewards for exploits are reportedly much smaller than in the contest’s glory days. The post China Revives Tianfu Cup Hacking Contest Under Increased Secrecy appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: China…
Edge computing’s biggest lie: “We’ll patch it later”
Edge computing is spreading fast, from factory floors to remote infrastructure. But many of these systems are hard to maintain once they are deployed. Devices may run old kernels, custom board support packages, or stacks that no one can rebuild…
New ClickFix Attack Wave Targets Windows Systems to Deploy StealC Stealer
A new wave of ClickFix attacks is targeting Windows users with fake Cloudflare-style CAPTCHA verification pages that trick victims into executing malicious PowerShell commands. This campaign delivers a multi-stage, fileless infection chain that ends with StealC, a powerful information stealer…
Attackers are moving at machine speed, defenders are still in meetings
Threat actors are using AI across the attack lifecycle, increasing speed, scale, and adaptability, according to the 2026 State of Cybersecurity report by Ivanti. The study compares perceived threat levels across common attack types with organizational readiness to respond and…
Cyber risk is becoming a hold-period problem for private equity firms
Private equity firms have spent years treating cybersecurity as an IT hygiene issue inside portfolio companies. That approach is getting harder to sustain as ransomware, data theft, and regulatory pressure interfere with value creation during the hold period. Has cybersecurity…
Zimbra Issues Security Update to Address XSS, XXE, and LDAP Injection Flaws
Zimbra has officially released a critical security update, version 10.1.16, addressing multiple high-severity vulnerabilities that could compromise email infrastructure and user data. The company has classified this patch with a “High” security severity rating, urging administrators to prioritize the upgrade…
BADIIS Malware Targets Over 1,800 Windows Servers in Massive SEO Poisoning Attack
Over 1,800 Windows IIS servers worldwide have been compromised in a large-scale search engine optimization (SEO) poisoning campaign driven by the BADIIS malware, a malicious IIS module used to hijack legitimate web traffic. The operation, tracked by Elastic Security Labs…
CISA Warns of Notepad++ Code Execution Vulnerability Exploited in Attacks
CISA has added CVE-2025-15556 to its Known Exploited Vulnerabilities (KEV) catalog, highlighting active exploitation of a critical code execution flaw in Notepad++, a widely used open-source text editor popular among developers and IT professionals. Added on February 12, 2026, with…
Cross-Platform Spyware Campaigns Target Indian Defense and Government Sectors
Cybersecurity researchers have identified multiple coordinated cyber espionage campaigns targeting organizations connected to India’s defense sector and government ecosystem. These operations are designed to infiltrate both Windows and Linux systems using remote access trojans that allow attackers to steal…
Exploited Microsoft Vulnerabilities, Phishing Tactics & Romance Scams: Cybersecurity Today
In this episode of Cybersecurity Today with host Jim Love, we discuss six critical exploited Microsoft vulnerabilities, new phishing tactics using your own servers, and a zero-click vulnerability in Claude’s code desktop extensions. We also explore trends in modern romance…
BeyondTrust RCE Vulnerability Under Active Exploitation – Urgent Patch Released
BeyondTrust has urgently released security updates to address a critical remote code execution (RCE) vulnerability affecting its widely used Remote Support (RS) and Privileged Remote Access (PRA) products. Designated as CVE-2026-1731, this severe flaw carries a near-maximum CVSS v4 score…
ASU’s CISO: AI craze is a strategic opportunity for security
<p>Cybersecurity leaders should capitalize on AI mania in the enterprise to address longstanding security problems, urged Arizona State University CISO Lester Godsey.</p> <p>”Executive management is all [in on] AI,” Godsey said during a recent session at CactusCon, an annual cybersecurity…
New infosec products of the week: February 13, 2026
Here’s a look at the most interesting products from the past week, featuring releases from Armis, Black Duck, Portnox, and SpecterOps. Armis Centrix brings unified, AI-driven application security to the SDLC Armis has announced Armis Centrix for Application Security, which…
AI-Powered Knowledge Graph Generator & APTs, (Thu, Feb 12th)
Unstructured text to interactive knowledge graph via LLM & SPO triplet extraction This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: AI-Powered Knowledge Graph Generator & APTs, (Thu, Feb 12th)
Naming and shaming: How ransomware groups tighten the screws on victims
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle This article has been indexed from WeLiveSecurity Read the original article: Naming and shaming: How ransomware groups tighten…
Closing the Cross-Platform Security Gap in Citizen Developer Apps
In many ways, managing security for citizen-developer apps is like flying several planes built by different manufacturers all at once. That’s because each no-code development platform uses separate dashboards, controls, policy engines, etc. Microsoft Power Platform measures altitude in feet,…