Categories Breaking News

Breaking News – Cyber Threats – 2026-02-12 07:00 PST

Breaking News – Cyber Threats (last 6h)

Generated: 2026-02-12 07:00 PST

  • AMOS infostealer targets macOS through a popular AI app
    BleepingComputer • 2026-02-12 06:25 • www.bleepingcomputer.com
    AMOS infostealer is targeting macOS users by abusing popular AI apps and extension marketplaces to harvest credentials. Flare examines how AMOS operates, spreads through AI-driven lures, and feeds the broader stealer-log cybercrime economy. […]
    https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/
  • Fake AI Chrome extensions with 300K users steal credentials, emails
    BleepingComputer • 2026-02-12 05:41 • www.bleepingcomputer.com
    A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information. […]
    https://www.bleepingcomputer.com/news/security/fake-ai-chrome-extensions-with-300k-users-steal-credentials-emails/
  • 3D Printer Surveillance
    Schneier on Security • 2026-02-12 04:01 • www.schneier.com

    New York is contemplating a bill that adds surveillance to 3D printers:

    New York’s 2026­2027 executive budget bill (S.9005 / A.10005) includes language that should alarm every maker, educator, and small manufacturer in the state. Buried in Part C is a provision requiring all 3D printers sold or delivered in New York to include “blocking technology.” This is defined as software or firmware that scans every print file through a “firearms blueprint …
    https://www.schneier.com/blog/archives/2026/02/3d-printer-surveillance.html

  • ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories
    The Hacker News • 2026-02-12 03:51 • thehackernews.com
    Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead of flashy new exploits, many operations are built around quiet misuse of trusted tools, familiar workflows, and overlooked exposures that sit in plain sight.
    Another shift is how access is gained versus how it’s used. Initial entry points are getting simpler, while post-compromise
    https://thehackernews.com/2026/02/threatsday-bulletin-ai-prompt-rce.html
  • The CTEM Divide: Why 84% of Security Programs Are Falling Behind
    The Hacker News • 2026-02-12 02:30 • thehackernews.com
    A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or industry and everything to do with a single framework decision. Organizations implementing Continuous Threat Exposure Management (CTEM) demonstrate 50% better attack surface visibility, 23-point
    https://thehackernews.com/2026/02/the-ctem-divide-why-84-of-security.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like