Breaking News – Cyber Threats (last 6h)
Generated: 2026-02-17 16:00 PST
- Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites
BleepingComputer • 2026-02-17 15:15 • www.bleepingcomputer.com
A Spanish court has granted precautionary measures against NordVPN and ProtonVPN, ordering the two popular VPN providers to block 16 websites that facilitate piracy of football matches. […]
https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/ - Flaws in popular VSCode extensions expose developers to attacks
BleepingComputer • 2026-02-17 13:27 • www.bleepingcomputer.com
Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local files and execute code remotely. […]
https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/ - Chinese hackers exploiting Dell zero-day flaw since mid-2024
BleepingComputer • 2026-02-17 12:15 • www.bleepingcomputer.com
A suspected Chinese state-backed hacking group has been quietly exploiting a critical Dell security flaw in zero-day attacks that started in mid-2024. […]
https://www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/ - Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
The Hacker News • 2026-02-17 11:08 • thehackernews.com
Cloud attacks move fast — faster than most incident response teams.
In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is short-lived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins.
Cloud forensics is fundamentally
https://thehackernews.com/2026/02/cloud-forensics-webinar-learn-how-ai.html - Notepad++ boosts update security with ‘double-lock’ mechanism
BleepingComputer • 2026-02-17 10:29 • www.bleepingcomputer.com
Notepad++ has adopted a “double-lock” design for its update mechanism to address recently exploited security gaps that resulted in a supply-chain compromise. […]
https://www.bleepingcomputer.com/news/security/notepad-plus-plus-boosts-update-security-with-double-lock-mechanism/ - Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
The Hacker News • 2026-02-17 10:08 • thehackernews.com
Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection.
The attack method, which has been demonstrated against Microsoft Copilot and xAI Grok
https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
