Latest Internet & Cybersecurity News
Google Releases Emergency Chrome Update for Critical Zero Day
Google has pushed an emergency patch for CVE-2026-5281, a high severity use-after-free vulnerability in the Dawn WebGPU component that is already being actively exploited in the wild. The flaw continues a pattern of rapidly weaponized browser vulnerabilities in 2026, with attackers cycling client-side vulnerabilities through live campaigns at speed.
Qualcomm Android Zero Day Escalates Across US Federal Networks
A Qualcomm-related Android zero day has transitioned from research finding to confirmed active exploitation, triggering mandatory patching across US federal networks. The vulnerability highlights how mobile stack threats are being weaponized alongside browser exploits in current attack campaigns.
Chinese Hackers Breach FBI Surveillance System in Major Incident
The FBI has declared a suspected Chinese hack of the US surveillance system a 'major cyber incident,' suggesting successful compromise of pen register and trap and trace devices used by law enforcement. The breach could expose FBI surveillance targets and reveal details of ongoing criminal probes to foreign intelligence services.
Iran-Aligned Hacktivist Groups Surge to 60 Active Campaigns
Palo Alto Networks' Unit 42 reports approximately 60 Iran-aligned and pro-Russian hacktivist groups are conducting sustained DDoS, defacement, and hack-and-leak operations across at least 16 countries, targeting governments, financial services, telecoms, and infrastructure. The activity follows recent US and Israeli operations and represents elevated geopolitical cyber tensions with spillover risks for Western commercial networks.
GhostSocks Malware Turns Devices Into Residential Proxies
Darktrace research reveals GhostSocks, a sophisticated malware that converts compromised devices into residential proxies to bypass IP detection tools used by cybersecurity systems. The malware reflects a significant shift in how state-sponsored and criminal threat actors are attempting to blend attack traffic into normal network activity.
Axios NPM Package Compromised in North Korean Supply Chain Attack
A long-lived NPM access token was exploited to bypass GitHub Actions OIDC-based CI/CD publishing workflow protections, enabling attackers to push backdoored versions of the Axios package. The incident underscores continued supply chain vulnerabilities targeting critical development tools used globally.
15-Year-Old strongSwan VPN Flaw Enables Denial of Service
A critical vulnerability, CVE-2026-25075, has been identified in strongSwan's EAP-TTLS plugin affecting versions 4.5.0 to 6.0.4, allowing attackers to crash VPN services through integer underflow and memory corruption. The flaw poses significant risk to organizations relying on strongSwan for secure remote access infrastructure.
AI-Powered Phishing Campaign Compromises 344 Organizations
An AI-enhanced phishing campaign has successfully compromised 344 organizations across construction, law, healthcare, and government sectors by exploiting Microsoft cloud accounts using OAuth tokens. The campaign demonstrates how attackers are leveraging AI to scale targeted credential theft operations.
City of Meriden, CT Data Breach Remains Unresolved
A ransomware group named Inc claimed responsibility for a cyberattack on the city of Meriden, Connecticut, that was reported on February 17, with services still being restored over a month later. The prolonged recovery timeline highlights the severe operational impact ransomware attacks inflict on municipal government infrastructure.
UK Manufacturing Sector Faces Widespread Cyber Incidents
ESET reports that 78% of UK manufacturers have experienced cyber incidents as disruption becomes increasingly widespread across the sector. The prevalence reflects how manufacturing remains a high-priority target for cybercriminals and state-sponsored threat actors globally.