Latest Internet & Cybersecurity News

đź“…February 19, 2026 at 1:00 PM
Major cybersecurity developments include Kyndryl's new defense center launch, surging evasive malware threats, and critical identity-based attack trends shaping 2026.
1

Kyndryl Launches Integrated Cyber Defense Operations Center

Kyndryl launched its first Cyber Defense Operations Center in Bengaluru, India, unifying network and security operations into a single integrated command hubSource 3. The center provides 24x7 monitoring, threat detection, and incident response globally, with plans to expand beyond India to support growing demand for integrated security operationsSource 3.

2

WatchGuard Reports 1500% Surge in New Malware Variants

WatchGuard's latest Internet Security Report reveals a sharp acceleration in evasive threats, with over 15 times more never-before-seen malware on endpoints designed to bypass detectionSource 7. An alarming 96% of blocked malware was delivered over encrypted TLS connections, creating major visibility gaps for organizations lacking HTTPS inspection capabilitiesSource 7.

3

Google Receives EU Approval for $32 Billion Wiz Acquisition

The European Commission granted unconditional approval for Google's $32 billion acquisition of cybersecurity firm Wiz on February 10, finding no competition concernsSource 1. EU antitrust chief Teresa Ribera confirmed that customers will retain credible alternatives and switching ability among cloud providersSource 1.

4

US FCC Urges Telecoms to Strengthen Ransomware Defenses

The US Federal Communications Commission warned telecoms companies to improve cybersecurity defenses, citing a fourfold increase in ransomware attacks since 2021Source 1. The January 29 alert highlighted that recent events expose US communications networks to cyber exploits posing significant risks to national security and business operationsSource 1.

5

Identity Attacks Dominate Breach Landscape

Identity-based attacks now account for approximately 30% of all intrusions, with stolen credentials appearing in roughly 49% of breaches according to recent researchSource 5Source 6. Attackers increasingly bypass traditional security by using stolen credentials and compromised authentication flows rather than technical exploits, allowing them to move across systems while appearing as legitimate usersSource 5.

6

AI-Driven Attacks Scaling Rapidly in 2026

Artificial intelligence is being weaponized for large-scale attacks, with 13% of companies reporting AI-related security incidents in 2025, and 97% of affected organizations lacking proper AI access controlsSource 5. Emerging threats include AI-generated phishing emails, deepfake audio and video for fraud, and automated vulnerability discovery at machine speedsSource 5Source 6.

7

Odido Telecom Data Breach Exposes 6 Million Accounts

Dutch telecoms company Odido confirmed a cyberattack exposing personal information from over six million accounts, including names, telephone numbers, email addresses, bank account numbers, and passport numbersSource 1. The company discovered the breach on February 7 and terminated unauthorized system accessSource 1.

8

South Korea Attributes Coupang Breach to Management Failures

South Korea's cybersecurity authorities attributed e-commerce retailer Coupang's data breach to management failures rather than sophisticated attacks, with a former engineer exploiting authentication vulnerabilities from April through NovemberSource 1. Deputy Minister Choi Woo-hyuk noted the attacker accessed user accounts without proper login credentials, causing large-scale unauthorized information leaksSource 1.

9

Credential Theft Fuels Automated Attack Chains

Security researchers discovered 183 million exposed email addresses and passwords online, with credential theft appearing in approximately 49% of breachesSource 6. These stolen credentials enable automated attack chains and are harvested by infostealer malware that silently collects browser data, cached applications, and password manager contentsSource 6.

10

Supply Chain Vulnerabilities Threaten Critical Infrastructure

Third-party vendor relationships create dangerous access vectors, with utilities working with an average of 340 third-party vendors having system access, and 60% of critical infrastructure breaches occurring through vendor pathwaysSource 6. Breaches involving third parties take significantly longer to identify—284 days versus 214 days for direct breachesSource 6.

11

Identity and Credential Attacks Emerging as Top Enterprise Risk

Credential abuse and account compromise remain among the top causes of enterprise breaches, particularly in cloud-based and remote working environmentsSource 8. Attackers focus on stealing credentials, hijacking login sessions, and bypassing multi-factor authentication to gain access to significant databases and cloud servicesSource 8.

12

Deepfakes Emerge as Alarming Security Risk for 2026

Deepfakes—realistic fake audio or video created with artificial intelligence—have emerged as critical threats for 2026, with attackers using them to deceive employees and executives into leaking confidential information or transferring paymentsSource 8. These attacks appear genuine and are significantly more convincing than ordinary scamsSource 8.