Latest Internet & Cybersecurity News

📅February 20, 2026 at 1:00 PM
Critical zero-days in Chrome, BeyondTrust, and Dell RecoverPoint exploited; ransomware hits hospitals, firms; WormGPT leak; rising OT threats and quantum risks dominate cybersecurity news.
1

Google Patches First 2026 Chrome Zero-Day

Google released an urgent critical security update for Chrome versions 145.0.7632.75/.76 (Windows/macOS) and 144.0.7559.75 (Linux) addressing the first zero-day vulnerability of 2026.Source 3 CISA added this flaw to its Known Exploited Vulnerabilities catalog, urging federal agencies to patch internet-facing systems immediately.Source 5 Prioritize patching collaboration platforms and monitor for unusual logins.Source 5

2

Active Exploitation of BeyondTrust CVE-2026-1731

Unit 42 observed attackers exploiting CVE-2026-1731 in BeyondTrust, involving network reconnaissance, webshell deployment, C2 traffic, backdoors, lateral movement, and data theft across U.S., France, Germany, Australia, and Canada.Source 2 Attackers used DNS tunneling for evasion and remoteVersion parameter injection for data exfiltration from configs and PostgreSQL dumps.Source 2 Sectors affected include multiple industries; patch immediately and monitor for new accounts.Source 2

3

UNC6201 Exploits Dell RecoverPoint Zero-Day CVE-2026-22769

Google Threat Intelligence identified UNC6201 exploiting CVE-2026-22769 (CVSS 10.0) in Dell RecoverPoint, deploying SLAYSTYLE, BRICKSTORM, and GRIMBOLT malware.Source 3 Mandiant confirmed Grimbolt exploitation, evolving from Brickstorm, targeting virtual infrastructure and backups in critical sectors.Source 7 Dell released patches; monitor IOCs and update VMware environments.Source 3Source 7

4

WormGPT.AI User Database Compromised

CYFIRMA reported WormGPT.AI, a platform for uncensored AI hacking models, breached with over 19,000 unique February 2026 user records leaked on a cybercrime forum.Source 1 The full database was made publicly downloadable by the actor.Source 1 Enhance cybersecurity postures against such leaks.Source 1

5

Space Bears Ransomware Hits Texcomp

Space Bears Ransomware attacked IT services firm Texcomp, publishing an SQL database with client names, emails, addresses, and phone numbers on its dark web site.Source 1 The breach exposed partner information, aiding digital transformation clients across industries.Source 1 No further disruptions reported.Source 1

6

Asahi Group Hospital Ransomware Leaks 131K PII Records

Ransomware actor breached a Japanese hospital network under Asahi Group, exfiltrating 131,135 unique PII records and a full database export, with media coverage by Asahi News and Nikkei.Source 1 Over 115,000 employee and client records confirmed leaked, causing operational disruptions.Source 5 Additional data release threatened.Source 1

7

Advantest Semiconductor Supplier Faces Ransomware

Japanese semiconductor test equipment supplier Advantest is responding to a ransomware attack impacting multiple company systems.Source 10 Operations disrupted as the firm addresses the incident.Source 10 No details on data exfiltration yet.Source 10

8

North Korean UNC1069 Targets Crypto with AI Video Deception

Researchers observed UNC1069 using social engineering, compromised Telegram, fake Zoom, ClickFix, and AI-generated video to deploy seven malware families against cryptocurrency and DeFi sectors.Source 1 Attackers deceived victims via sophisticated lures.Source 1 Heightened vigilance needed in crypto.Source 1

9

Hacktivists Hit Italian Airports and Infrastructure

Hacktivist collectives targeted websites of two Italian airports and critical infrastructure, confirmed by authorities but mitigated with no significant disruptions.Source 1 Defenses held, preventing lasting effects.Source 1 Ongoing geopolitical tensions in cyber domain.Source 1

10

CISA Adds Four Vulnerabilities to KEV Catalog

CISA expanded its Known Exploited Vulnerabilities catalog with four flaws in Google Chrome, Microsoft Windows, Zimbra, and security software, setting strict patching deadlines for federal agencies.Source 5 Actively exploited; prioritize internet-facing systems and remove legacy components.Source 5 Monitor for file uploads and logins.Source 5

11

Quantum 'Harvest Now, Decrypt Later' Threats Rise

Nation-state actors conduct 'harvest now, decrypt later' campaigns, stockpiling encrypted data for future quantum decryption, prompting enterprise security spending records.Source 9Source 11 AI-augmented security and zero trust top 2026 priorities amid $6.15T IT spend.Source 9 Prepare quantum readiness now.Source 11

12

OT Threats Target Virtualization, Not Just PLCs

Dragos 2026 OT Report highlights attacks on virtualization, identity systems causing outages without touching ICS; hacktivists like BAUXITE use wipers and OT interaction.Source 4 Focus shifted to supporting infrastructure for visibility and control.Source 4 Attribution challenges complicate responses.Source 4