7secure

11
Feb

Zero‑day surge strains enterprise resilience. AI‑driven detection and zero‑trust defenses rise. 🚨⚙️

Good morning, February 11, 2026. Here’s the latest cyber and AI threat intelligence. Today's headlines * Amaranth‑Dragon
6 min read
10
Feb
VMware Unveils vDefend: Zero‑Trust Micro‑Segmentation for Hybrid Cloud

VMware Unveils vDefend: Zero‑Trust Micro‑Segmentation for Hybrid Cloud

VMware’s security team announced the vDefend framework, a set of built‑in controls that bring zero‑trust principles to
1 min read
10
Feb
Android Trojan Hijacks Hugging Face to Distribute RAT Payloads

Android Trojan Hijacks Hugging Face to Distribute RAT Payloads

Bitdefender researchers identified a new Android trojan that uses the Hugging Face platform—normally a repository for AI models—to
1 min read
10
Feb
CrowdStrike’s Falcon Wins Gartner Customers’ Choice for External Attack Surface Management

CrowdStrike’s Falcon Wins Gartner Customers’ Choice for External Attack Surface Management

CrowdStrike’s Falcon platform has been named the exclusive Gartner Customers’ Choice for External Attack Surface Management (EASM). The award
1 min read
10
Feb
CrowdStrike Unveils Linux Sensor Techniques to Sniff Out Web‑Shell Persistence

CrowdStrike Unveils Linux Sensor Techniques to Sniff Out Web‑Shell Persistence

CrowdStrike’s recent blog details how its Falcon sensor on Linux platforms now correlates file‑system changes, process‑injection behavior,
1 min read
10
Feb
Bitdefender Finds Malicious Payloads Lurking in OpenClaw AI Skills

Bitdefender Finds Malicious Payloads Lurking in OpenClaw AI Skills

Bitdefender Labs conducted a systematic review of the OpenClaw AI skill marketplace and identified a rising tide of skills that
1 min read
10
Feb

CISA Flags Public Hacking Tools Seen in Recent Breaches

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that catalogs dozens of publicly available hacking utilities identified
1 min read
10
Feb
Turn Cloud Logs into Threat Intel: Unit42’s New Detection Playbook

Turn Cloud Logs into Threat Intel: Unit42’s New Detection Playbook

Unit42’s latest research shows how defenders can repurpose native cloud logs—such as AWS CloudTrail and Azure Activity Logs—
1 min read
10
Feb
AI Chat Previews Leak Malicious URL Contents, Exposing Sensitive Data

AI Chat Previews Leak Malicious URL Contents, Exposing Sensitive Data

AI agents built into popular messaging apps automatically generate link previews by fetching the target URL and extracting a snippet
1 min read
10
Feb
Shadow Campaigns: New Espionage Ops Exploit Hundreds of CVEs for Persistent Access

Shadow Campaigns: New Espionage Ops Exploit Hundreds of CVEs for Persistent Access

Unit42’s latest research uncovered a coordinated set of espionage operations, labeled “Shadow Campaigns,” that systematically abuse a broad spectrum
1 min read