Breaking News – Cyber Threats (last 6h)
Generated: 2026-02-23 12:00 PST
- Microsoft says bug in classic Outlook hides the mouse pointer
BleepingComputer • 2026-02-23 11:40 • www.bleepingcomputer.com
Microsoft is investigating a known issue that causes the mouse pointer to disappear in the classic Outlook desktop email client for some users. […]
https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-in-classic-outlook-hides-the-mouse-pointer/ - Ad tech firm Optimizely confirms data breach after vishing attack
BleepingComputer • 2026-02-23 10:04 • www.bleepingcomputer.com
New York-based ad tech company Optimizely has notified an undisclosed number of customers of a data breach after threat actors compromised some of its systems in a voice phishing attack. […]
https://www.bleepingcomputer.com/news/security/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/ - Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
The Hacker News • 2026-02-23 09:59 • thehackernews.com
Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts.
“Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim
https://thehackernews.com/2026/02/wormable-xmrig-campaign-uses-byovd.html - When identity isn’t the weak link, access still is
BleepingComputer • 2026-02-23 07:00 • www.bleepingcomputer.com
Stolen tokens and compromised devices let attackers reuse trust without breaking authentication. Specops Software explains why identity alone isn’t enough and how continuous device verification strengthens Zero Trust. […]
https://www.bleepingcomputer.com/news/security/when-identity-isnt-the-weak-link-access-still-is/ - Another day, another malicious JPEG, (Mon, Feb 23rd)
SANS ISC Diary (full) • 2026-02-23 06:26 • isc.sans.eduIn his last two diaries, Xavier discussed recent malware campaigns that download JPEG files with embedded malicious payload[1,2]. At that point in time, I've not come across the malicious “MSI image†myself, but while I was going over malware samples that were caught by one of my customer's e-mail pr…
https://isc.sans.edu/diary/rss/32738
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
