Latest Internet & Cybersecurity News

đź“…February 11, 2026 at 1:00 AM
February 2026 cybersecurity headlines feature Microsoft's zero-day patches, Poland grid attack warnings, AI safety risks, supply chain threats, and quantum cryptography concerns.
1

Microsoft Patches 6 Actively Exploited Zero-Days in February 2026 Updates

Microsoft's February 2026 Patch Tuesday fixes 60 vulnerabilities, including six zero-days under active exploitation.Source 1 Organizations urged to apply updates immediately to mitigate risks from ongoing attacks.Source 1 This release addresses critical flaws targeted by threat actors worldwide.Source 1

2

Cisco AsyncOS Email Gateway Faces Maximum-Severity RCE Exploited by China-Linked APT

CVE-2025-20393 (CVSS 10.0) in Cisco Secure Email Gateway exploited by UAT-9686 since late 2025 into February 2026.Source 2 The remote code execution flaw affects AsyncOS-based appliances.Source 2 Administrators should patch vulnerable systems promptly.Source 2

3

European Commission Breached via Ivanti EPMM Zero-Days

Attackers exploited CVE-2026-1281 and CVE-2026-1340 in Ivanti EPMM, detected January 30, 2026, disclosed February 9.Source 2 Data exfiltration occurred before detection by the European Commission.Source 2 Highlights risks to government mobile device management.Source 2

4

Open VSX Registry Supply-Chain Attack Poisons 49 VS Code Extensions

Hackers used stolen OVSX_PAT token to inject GlassWorm malware into extensions around January 30, 2026.Source 2 Malware exfiltrates SSH keys, cloud credentials, and wallet data.Source 2 Users of Open VSX should update extensions and revoke tokens.Source 2

5

BreachForums XSS Flaw Leads to User Data Theft

Stored/reflected XSS on BreachForums exploited February 4, 2026, by attacker 'Nicotine'.Source 2 Captured user data shared on darkweb channels.Source 2 Forum users advised to change credentials and enable 2FA.Source 2

6

CISA Warns US Infrastructure After Russian-Linked Attack on Poland Power Grid

Destructive cyberattack in December targeted Poland's renewable energy via vulnerable edge devices, linked to Static Tundra/Berserk Bear.Source 4 CISA amplifies Polish CERT report, stressing OT/ICS risks.Source 4 Attack deployed wiper malware, disrupting control systems.Source 4

7

NCSC Alerts UK CNI Providers on Severe Cyber Threats Post-Poland Attacks

UK NCSC urges critical infrastructure to act against malware threats seen in Poland's energy sector.Source 6 Follows December coordinated attacks on wind and solar farms.Source 6 Emphasizes immediate resilience measures.Source 6

8

International AI Safety Report 2026 Warns of AI-Enabled Cyberattacks

Report details GPAI aiding vulnerability discovery, code exploits, used by criminals and states.Source 3 Highlights deepfakes for scams, fraud, but AI not yet fully autonomous in attacks.Source 3 Calls for balancing offensive and defensive AI innovations.Source 3

9

Bitsight Launches Dark Web Intelligence for Supply Chains

New tool provides real-time threat visibility into vendor breaches and targeting.Source 5 AI maps darkweb signals to third-party exposures.Source 5 Addresses CEO concerns on supply chain resilience.Source 5

10

Citi Estimates $2-3.3 Trillion GDP Risk from Quantum Cyberattack on Fedwire

Quantum-enabled attack on US bank could disrupt payments, cascading to economy.Source 11 'Harvest now, decrypt later' threats already active on long-lived data.Source 11 Urges massive cryptography upgrade beyond Y2K scale.Source 11

11

Vectra AI Report Reveals Lagging Cyber Resilience Despite AI Investments

2026 State of Threat Detection shows security teams lack confidence in threat signals.Source 7 Gap persists between investments and real-world response.Source 7 Calls for better visibility and outcomes proof.Source 7

12

ENISA International Strategy 2026 Boosts Global Cybersecurity Partnerships

Strategy aligns EU policy with partners, extends tools to Balkans, Ukraine, US.Source 9 Focuses on capacity building, info sharing amid evolving threats.Source 9 Operationalizes EU Cybersecurity Reserve for associates.Source 9