Breaking News – Cyber Threats (last 6h)
Generated: 2026-02-12 07:00 PST
- AMOS infostealer targets macOS through a popular AI app
BleepingComputer • 2026-02-12 06:25 • www.bleepingcomputer.com
AMOS infostealer is targeting macOS users by abusing popular AI apps and extension marketplaces to harvest credentials. Flare examines how AMOS operates, spreads through AI-driven lures, and feeds the broader stealer-log cybercrime economy. […]
https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/ - Fake AI Chrome extensions with 300K users steal credentials, emails
BleepingComputer • 2026-02-12 05:41 • www.bleepingcomputer.com
A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information. […]
https://www.bleepingcomputer.com/news/security/fake-ai-chrome-extensions-with-300k-users-steal-credentials-emails/ - 3D Printer Surveillance
Schneier on Security • 2026-02-12 04:01 • www.schneier.comNew York is contemplating a bill that adds surveillance to 3D printers:
New York’s 20262027 executive budget bill (S.9005 / A.10005) includes language that should alarm every maker, educator, and small manufacturer in the state. Buried in Part C is a provision requiring all 3D printers sold or delivered in New York to include “blocking technology.” This is defined as software or firmware that scans every print file through a “firearms blueprint …
https://www.schneier.com/blog/archives/2026/02/3d-printer-surveillance.html - ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories
The Hacker News • 2026-02-12 03:51 • thehackernews.com
Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around quiet misuse of trusted tools, familiar workflows, and overlooked exposures that sit in plain sight.
Another shift is how access is gained versus how it’s used. Initial entry points are getting simpler, while post-compromise
https://thehackernews.com/2026/02/threatsday-bulletin-ai-prompt-rce.html - The CTEM Divide: Why 84% of Security Programs Are Falling Behind
The Hacker News • 2026-02-12 02:30 • thehackernews.com
A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or industry and everything to do with a single framework decision. Organizations implementing Continuous Threat Exposure Management (CTEM) demonstrate 50% better attack surface visibility, 23-point
https://thehackernews.com/2026/02/the-ctem-divide-why-84-of-security.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
