Latest Internet & Cybersecurity News
Recorded Future 2026 State of Security Report Warns of Cyber as Core Global Power Tool
Cyber operations are now inseparable from physical conflict, driven by geopolitical fragmentation and AI, creating persistent threats in 2026. Nation-states use cyber access for coercion via network edges, with identity as the primary attack surface
. Predictions include fragmented always-on threats and connectivity disruptions as escalation tools
.
February 2026 Patch Tuesday: Microsoft Fixes 59 Vulnerabilities Including 6 Zero-Days
Microsoft, SAP, Intel, Adobe, and over 60 vendors released critical security patches, with Microsoft addressing 59 flaws including actively exploited zero-days. APT28 and APT29 likely exploiting Microsoft issues targeting government and infrastructure
. No exploitation yet reported for new SAP, Intel TDX, or Adobe vulnerabilities
.
FIRST Forecasts Over 50,000 CVEs in 2026, Potentially Surging to Six Figures
Cybersecurity group FIRST predicts 50,000+ CVE disclosures in 2026, with median 59,000 and upper range near 117,000, straining security teams. Organizations must prioritize high-risk vulnerabilities amid expanding asset estates
. Three-year outlook shows sustained high volumes through 2028
.
Google Detects State-Backed Hackers Abusing Gemini AI for Recon and Phishing
Nation-state actors use Google's Gemini AI for target profiling, phishing kits like COINBAIT, and malware staging with HONESTCUE. Activities linked to financially motivated UNC5356 cluster
. This highlights AI's role in enhancing attacker capabilities
.
Apple Patches Critical Zero-Day CVE-2026-20700 Exploited in Targeted Attacks
Apple fixed memory corruption vulnerability in dyld (CVE-2026-20700) exploited in targeted attacks, affecting iPhone 11+, iPads, and macOS Tahoe. Discovered by Google's Threat Analysis Group, linked to prior 2025 campaigns
. Users urged to update to iOS 18.7.5 and macOS Tahoe 26.3 immediately
.
China-Linked Storm 2603 Exploits SmarterMail Flaws for Warlock Ransomware
Threat actor Storm 2603 used CVE-2026-23760 authentication bypass in SmarterMail to deploy Warlock ransomware. CISA added CVE-2026-24423 to Known Exploited Vulnerabilities on Feb 5, with exploitation since Jan 28
. Targets small to medium businesses using SmarterMail as Exchange alternative
.
Chinese APTs Salt Typhoon and UNC3886 Embed in Global Telecom Infrastructure
Chinese state-linked groups exploit routers, firewalls from Cisco, Ivanti, others with rootkits for stealthy persistence. Systematic intrusions in telecom worldwide over recent years
. CYFIRMA also reports Leora Infotech data breach by KaruHunters on dark web
.
AI Accelerates Cybercrime: Lowered Costs, Identity as New Perimeter
AI reduces cyberattack costs to near zero, enabling ransomware at 10x speed and 80% AI phishing with MFA bypass. Fortinet predicts cybercrime acceleration via AI automation; budgets rise 25%+ for AI risks
. Employee public AI use doubled, mirroring threat actor speed
.
International AI Safety Report 2026 Highlights GPAI in Cyberattacks
Report assesses general-purpose AI enabling cyberattacks via vulnerability ID and code execution, used by criminals and states. AI scales attack prep but not fully autonomous yet; dual-use challenges hinder restrictions
. Largest global AI safety collaboration led by Yoshua Bengio
.
Hacktivists, State Actors from Russia, China Target Global Defense Industry
Google warns of attacks by Russian, Chinese, North Korean, Iranian actors on defense sector alongside hacktivists and cybercriminals. Ongoing campaigns exploit supply chains and remote access vectors
. Highlights defense as high-value target amid geopolitical tensions
.