Today's Core Dump is brought to you by ThreatPerspective

Biz & IT - Ars Technica

Attackers prompted Gemini over 100,000 times while trying to clone it, Google says

Distillation technique lets copycats mimic Gemini at a fraction of the development cost. On Thursday, Google announced that "commercially motivated" actors have attempted to c

Published: 2026-02-12T19:42:08



Biz & IT - Ars Technica

Malicious packages for dYdX cryptocurrency exchange empties user wallets

Incident is at least the third time the exchange has been targeted by thieves. Open source packages published on the npm and PyPI repositories were laced with code that stole

Published: 2026-02-06T22:16:51



Biz & IT - Ars Technica

Microsoft releases urgent Office patch. Russian-state hackers pounce.

The window to patch vulnerabilities is shrinking rapidly. Russian-state hackers wasted no time exploiting a critical Microsoft Office vulnerability that allowed them to compro

Published: 2026-02-04T23:08:04



The Register - Software

Android malware taps Gemini to navigate infected devices

The real deal or another research project overblown? Cybersecurity researchers say they've spotted the first Android malware strain that uses generative AI to improve performance once installed. But it may be only a proof of concept.

Published: 2026-02-19T16:04:52



The Register - Software

Healthcare security: Write login details on whiteboard, hope for the best

You told me not to write it on a Post-it... Bork!Bork!Bork! Today's bork is entirely human-generated and will send a shiver down the spine of security pros. No matter how secure a system is, a user's ability to undo an administrator's best efforts s

Published: 2026-02-19T11:14:14



The Register - Software

Notepad++ declares hardened update process 'effectively unexploitable'

Miscreants will need to find another avenue for malware shenanigans Notepad++ has continued beefing up security with a release the project's author claims makes the "update process robust and effectively unexploitable."

Published: 2026-02-18T12:41:26



The Register - Software

HackerOne 'updating' Ts&Cs after bug hunters question if they're training AI

CEO lauds security researchers, insists they're not 'inputs' HackerOne has clarified its stance on GenAI after researchers fretted their submissions were being used to train its models.

Published: 2026-02-18T11:00:07



The Register - Software

Resilient, continuously active data with no compromise

When the gap between data generation and action is a strategic liability, it's time for a fix Sponsored Feature Today's digital economy is generating data in unprecedented volumes, flooding enterprise IT systems from a multitude of sources, includin

Published: 2026-02-17T16:00:08



The Register - Software

Google patches Chrome zero-day as in-the-wild exploits surface

High-severity CSS flaw let malicious webpages run code inside the sandbox Google has quietly pushed out an emergency Chrome fix after attackers were caught exploiting the browser's first reported zero-day of 2026.

Published: 2026-02-16T12:39:06



Security | The Verge

The AI security nightmare is here and it looks suspiciously like lobster

A hacker tricked a popular AI coding tool into installing OpenClaw - the viral, open-source AI agent OpenClaw that "actually does things" - absolutely everywhere. Funny as a stunt, but a sign of what to come as more and more people let autonomous software use their computers on their behalf. The hacker took advantage of […] A hacker tricked a popular AI coding tool into installing OpenClaw - the viral, open-source AI agent OpenClaw that "actually does things" - absolutely everywhere. Funny as a stunt, but a sign of what to come as more and more people let autonomous s...

Published: 2026-02-19T13:58:56



Security | The Verge

Texas is suing TP-Link over its ties to China

Texas Attorney General Ken Paxton is suing TP-Link over claims that the router-maker is misleading customers about its ties to China. In a lawsuit filed this week, Paxton claims TP-Link is "masking its Chinese connections," while serving as "an open window for Chinese-sponsored threat actors and Chinese intelligence agencies." TP-Link was founded in China, but […] Texas Attorney General Ken Paxton is suing TP-Link over claims that the router-maker is misleading customers about its ties to China. In a lawsuit filed this week, Paxton claims TP-Link is "masking its Chinese connections," while serving as "an ope...

Published: 2026-02-19T13:20:25



Security | The Verge

Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company's Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users "into clicking a malicious link inside a Markdown file opened in Notepad," as reported earlier by The Register. Clicking the link […] The Microsoft Windows logo on an illustrated background. Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company's Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users "into clicking a malicious l...

Published: 2026-02-11T13:06:36



Security | The Verge

Microsoft is keeping Secure Boot alive with Windows updates

Microsoft is automatically replacing boot-level security certificates on Windows devices before they start expiring later this year. The new Secure Boot certificates will be rolled out as part of the regular Windows platform updates, according to Microsoft's announcement blog, marking a "generational refresh" of the security standard. Secure Boot was introduced in 2011 to protect […] The Microsoft Windows logo on an illustrated background. Microsoft is automatically replacing boot-level security certificates on Windows devices before they start expiring later this year. The new Secure Boot certificates will be rolled out as part of the regular Windows platform updates, according to M...

Published: 2026-02-10T12:00:00



Security | The Verge

Substack data breach exposed users emails and phone numbers

Substack is notifying some users that the email addresses and phone numbers linked to their accounts were exposed in a "security incident" last year. In an email to account holders, Substack CEO Chris Best said that a hacker had accessed internal data without authorization in October 2025, but that passwords, credit card numbers, and other […] An illustration of the Substack logo Substack is notifying some users that the email addresses and phone numbers linked to their accounts were exposed in a "security incident" last year. In an email to account holders, Substack CEO Chris Best said that a hacker had accessed internal d...

Published: 2026-02-05T05:55:06



Security | The Verge

OpenClaw’s AI ‘skill’ extensions are a security nightmare

OpenClaw, the AI agent that has exploded in popularity over the past week, is raising new security concerns after researchers uncovered malware in hundreds of user-submitted "skill" add-ons on its marketplace. In a post on Monday, 1Password product VP Jason Meller says OpenClaw's skill hub has become "an attack surface," with the most-downloaded add-on serving […] The OpenClaw logo on a red background. OpenClaw, the AI agent that has exploded in popularity over the past week, is raising new security concerns after researchers uncovered malware in hundreds of user-submitted "skill" add-ons on its marketplace. In a post on Monday, 1Password product...

Published: 2026-02-04T14:03:38



Security | The Verge

Google Cloud's customer chief returns to Microsoft as head of security

Microsoft has a new head of security. Hayete Gallot, who left Microsoft in October 2024 to become the president of Google Cloud's customer experience, is returning to the software giant as the executive vice president of security, reporting directly to CEO Satya Nadella. The move means Charlie Bell, formerly Microsoft's security chief, is taking on […] Vector illustration of the Microsoft logo. Microsoft has a new head of security. Hayete Gallot, who left Microsoft in October 2024 to become the president of Google Cloud's customer experience, is returning to the software giant as the executive vice president of security, reporting directl...

Published: 2026-02-04T12:27:30



BleepingComputer

CISA orders feds to patch actively exploited Dell flaw within 3 days

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems within three days against a maximum-severity Dell vulnerability that has been under active exploitation since mid-2024. [...]

Published: 2026-02-19T10:30:37



BleepingComputer

Nigerian man gets eight years in prison for hacking tax firms

A Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over $8.1 million in refunds. [...]

Published: 2026-02-19T08:51:49



BleepingComputer

Texas sues TP-Link over Chinese hacking risks, user deception

Texas sued networking giant TP-Link Systems, accusing the company of deceptively marketing its routers as secure while allowing Chinese state-backed hackers to exploit firmware vulnerabilities and access users' devices. [...]

Published: 2026-02-19T07:36:51



BleepingComputer

Hackers target Microsoft Entra accounts in device code vishing attacks

Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts.

Published: 2026-02-19T07:30:37



BleepingComputer

Police arrests 651 suspects in African cybercrime crackdown

African authorities arrested 651 suspects and recovered over $4.3 million in a joint operation targeting investment fraud, mobile money scams, and fake loan applications. [...]

Published: 2026-02-19T06:24:17



BleepingComputer

New 'Massiv' Android banking malware poses as an IPTV app

A newly identified Android banking trojan named Massiv has been under active distribution across south Europe, disguised as an IPTV app. [...]

Published: 2026-02-19T05:00:00



BleepingComputer

Critical infra Honeywell CCTVs vulnerable to auth bypass flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking. [...]

Published: 2026-02-18T15:58:20



BleepingComputer

AI platforms can be abused for stealthy malware communication

AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity. [...]

Published: 2026-02-18T15:18:24



BleepingComputer

Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages

Microsoft says an Exchange Online issue that mistakenly quarantined legitimate emails last week was triggered by faulty heuristic detection rules designed to block credential phishing campaigns. [...]

Published: 2026-02-18T11:26:53



BleepingComputer

Data breach at fintech firm Figure affects nearly 1 million accounts

Hackers have stolen the personal and contact information of nearly 1 million accounts after breaching the systems of Figure Technology Solutions, a self-described blockchain-native financial technology company. [...]

Published: 2026-02-18T09:01:08



Technology

End of the Line? Futuristic Saudi megacity facing major redesign

According to a new report, Saudi Arabia's Line megacity is undergoing a major rethink and will be much more modest in scope than the original vision There has been a lot of architecture news coming out of Saudi Arabia recently, little of which has been good. Now the jewel in the crown of the desert kingdom's ongoing transformation, the Line, appears to be facing a major rethink.Continue ReadingCa...

Published: 2026-02-07T15:03:00



Threat Intelligence

From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day

Written by: Peter Ukhanov, Daniel Sislo, Nick Harbour, John Scarbrough, Fernando Tomlinson, Jr., Rich Reece Introduction Mandiant and Google Threat Intelligence Group (GTIG) have identified the zero-day exploitation of a high-risk vulnerability in

Published: 2026-02-17T14:00:00








© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us