
A Chrome extension called QuickLens – Search Screen with Google Lens was removed after a malicious version 5.8 compromised thousands of users. The update introduced a ClickFix attack, stripped security headers, and connected to a command‑and‑control server that delivered malicious JavaScript and crypto‑wallet stealing modules. The payload displayed fake Google Update prompts that installed a signed executable, executed PowerShell commands, and harvested credentials, wallet seed phrases, and personal data. Google has disabled the extension and warned users to uninstall, scan, and reset passwords.

Microsoft released Windows 11 Insider Preview builds that add a new batch‑file security mode, letting administrators lock batch files in use via the LockBatchFilesInUse registry key or the LockBatchFilesWhenInUse manifest control. The change reduces the need for per‑statement signature validation, boosting script...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has detailed how the RESURGE implant silently resides on Ivanti Connect Secure appliances, exploiting the zero‑day CVE‑2025‑0282. The 32‑bit Linux shared object libdsupgrade.so remains dormant until it detects a specific inbound TLS...

Ukrainian national Yurii Nazarenko pleaded guilty to operating OnlyFake, an AI‑powered subscription service that sold more than 10,000 counterfeit passports, driver’s licenses and Social Security cards to customers worldwide. The site accepted only cryptocurrency, allowed customization of documents, and marketed...

ManoMano, a leading European DIY e‑commerce platform, disclosed a data breach affecting roughly 38 million customers after hackers compromised a Tunis‑based third‑party customer support provider. The breach exposed personal details such as names, email addresses, phone numbers, and support ticket communications,...

Juniper Networks disclosed a critical CVE‑2026‑21902 vulnerability in the On‑Box Anomaly Detection framework of its Junos OS Evolved running on PTX Series routers. The flaw lets an unauthenticated attacker reach a root‑level service over an external port, enabling full device...

Olympique de Marseille confirmed it was the target of an attempted cyberattack after a threat actor claimed to have breached its servers and leaked a sample of a database containing staff and supporter information. The club said its technical teams...

Chainalysis reports ransomware victims paid only 28% of demanded sums in 2025, the lowest rate on record despite a 50% surge in attacks. Total on‑chain ransomware payments are near $820 million and could exceed $900 million as attribution improves. While the number...

Microsoft has broadened its first‑sign‑in restore experience, part of Windows Backup for Organizations, to include hybrid‑managed devices, multi‑user setups, and Windows 365 Cloud PCs. The feature lets users who sign in with a Microsoft Entra ID account restore personal settings and...

UFP Technologies, a $600 million medical‑device maker, disclosed a cyberattack detected on February 14 that compromised several IT systems. The company isolated the breach, removed the threat and engaged external advisors, but confirmed that data was stolen and some functions, such as...

OpenClaw, an AI‑driven automation framework with a modular skill marketplace, has sparked intense discussion across developer forums and security‑research channels. Critical flaws—including CVE‑2026‑25253, which enables one‑click remote code execution, and a lack of skill sandboxing—expose users to credential theft and...

Zyxel has issued security updates to fix a critical remote code execution flaw (CVE‑2025‑13942) affecting more than a dozen of its router, CPE and extender models. The vulnerability exploits the UPnP function and requires both UPnP and WAN access to...

A financially motivated group called Diesel Vortex has been running a phishing campaign against freight and logistics operators in the U.S. and Europe since September 2025. Using 52 domains and Cyrillic homoglyph tricks, the actors stole 1,649 unique credentials from...

North Korean state‑backed Lazarus group has been linked to recent Medusa ransomware attacks targeting U.S. healthcare providers. Symantec’s report identifies a Lazarus sub‑unit, possibly Andariel/Stonefly, using the Medusa RaaS platform, which has affected more than 380 organizations since its 2021...

Security firm Oversecured scanned ten Android mental‑health apps with more than 14.7 million combined installs and uncovered 1,575 vulnerabilities. The flaws include 54 high‑severity and 538 medium‑severity issues such as insecure intent handling, plaintext API keys, and weak random number generation....