Skip to content
February 2026 Page 11

February 2026

How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

The Hacker NewsFeb 17, 2026Cloud Security / Digital Forensics Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build… 

Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations

Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations

Ravie LakshmananFeb 17, 2026Enterprise Security / Artificial Intelligence New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the “Summarize with AI” button that’s being increasingly placed on websites… 

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

Ravie LakshmananFeb 17, 2026Encryption / Mobile Security Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages. The feature is currently… 

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Ravie LakshmananFeb 16, 2026Artificial Intelligence / Threat Intelligence Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim’s OpenClaw (formerly Clawdbot and Moltbot) configuration environment. “This finding marks… 

Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers

Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers

Ravie LakshmananFeb 16, 2026Vulnerability / Encryption A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. “The attacks range in severity…