lithos Twitter
Lithos Header
News DB:
 URL DB:
Last Updated
Age in hrs 
1
2
3
5
8
13
21
34
55

 ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA  - Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly...

 Chinese APT Group Exploits Dell Zero-Day for Two Years  - Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines

 News alert: Award nominations reveal a shift from AI hype to a sharper focus on governing agentic AI  - WASHINGTON, Feb. 17, 2026, CyberNewswire: The Cybersecurity Excellence Awards today published early nomination insights from the 2026 program, highlighting a shift in vendor emphasis from broad AI positioning toward governance frameworks, identity architecture, and measurable accountability. Produced...

 New 'Massiv' Android banking malware poses as an IPTV app  - A newly identified Android banking trojan named Massiv has been under active distribution across south Europe, disguised as an IPTV app.

 Telegram channels expose rapid weaponization of SmarterMail flaws  - Underground Telegram channels shared SmarterMail exploit PoCs and stolen admin credentials within days of disclosure. Flare explains how monitoring these communities reveals rapid weaponization of CVE-2026-24423 and CVE-2026-23760 tied to ransomware activity.

 Spanish police say they have arrested hacker who booked luxury hotel rooms for just one cent  - Spain's police force has announced that it has arrested a 20-year-old man who they claim managed to book luxury hotel rooms worth up to €1,000 a night for just one euro cent. Read more in my article on the Hot for Security blog.

 Cryptojacking Campaign Exploits Driver to Boost Monero Mining  - Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics

 News alert: CredShields research informs OWASP’s 2026 ‘Smart Contract Security Priorities Project’  - SINGAPORE, Feb. 17th, 2026, CyberNewswire — The OWASP Smart Contract Security Project has released the OWASP Smart Contract Top 10 2026, a risk prioritization framework developed from structured analysis of real world exploit data observed across blockchain ecosystems in 2025.

 Glendale man gets 5 years in prison for role in darknet drug ring  - ​A Glendale man was sentenced to nearly five years in federal prison for his role in a darknet drug trafficking operation that sold cocaine, methamphetamine, MDMA, and ketamine to customers across the United States.

 Laser-Written Glass Could Store Data for Millennia  - Microsoft's Project Silica stores gigabits per cubic millimeter

 Android 17 Beta Introduces Secure-By-Default Architecture  - Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development

 News alert: Link11’s ‘AI Management Dashboard’ makes AI traffic, AI access policies enforceable  - FRANKFURT, Feb. 19, 2026, CyberNewswire — Link11 launches its new “ AI Management Dashboard ”, closing a critical gap in how companies manage AI traffic. Artificial intelligence is fundamentally changing internet traffic. But while many companies are already feeling the strain of AI crawlers on...

 Flaws in popular VSCode extensions expose developers to attacks  - Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local files and execute code remotely.

CyberSec News Aggregator Page: The freshest links are havested from the domains below.

cisanow
cisanow
vmraynow