How AI Collapses Your Response Window
We’ve all seen this before: a developer deploys a new cloud workload…
Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution
Ravie LakshmananFeb 18, 2026Network Security / Enterprise Security Cybersecurity researchers have disclosed…
Telegram channels expose rapid weaponization of SmarterMail flaws
Flare researchers monitoring underground Telegram channels and cybercrime forums have observed threat…
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Ravie LakshmananFeb 18, 2026Mobile Security / Spyware New research from the Citizen…
SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer
Ravie LakshmananFeb 17, 2026Infostealer / Artificial Intelligence Cybersecurity researchers have disclosed details…
Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
Ravie LakshmananFeb 16, 2026Artificial Intelligence / Threat Intelligence Cybersecurity researchers disclosed they…
How Lithuania Is Bracing for AI‑Driven Cyber Fraud
Presentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’…
Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging
Microsoft has disclosed details of a new version of the ClickFix social…
Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability
Threat actors have started to exploit a recently disclosed critical security flaw…


