Skip to content
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

Ravie LakshmananFeb 18, 2026Zero-Day / Vulnerability A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according to… 

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

Ravie LakshmananFeb 18, 2026Vulnerability / Application Security Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver… 

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

Ravie LakshmananFeb 18, 2026Threat Intelligence / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the… 

Intellexa’s Predator spyware used to hack iPhone of journalist in Angola, research says

Intellexa’s Predator spyware used to hack iPhone of journalist in Angola, research says

A government customer of sanctioned spyware maker Intellexa hacked the phone of a prominent journalist in Angola, according to Amnesty International, the latest case of targeting someone in civil society with powerful phone hacking software.… 

Most VMware users still “actively reducing their VMware footprint,” survey finds

Most VMware users still “actively reducing their VMware footprint,” survey finds

Migrations are ongoing Broadcom introduced changes to VMware that are especially unfriendly to small- and-medium-sized businesses (SMBs), and Gartner previously predicted that 35 percent of VMware workloads would migrate else by 2028. CloudBolt’s survey also… 

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Ravie LakshmananFeb 17, 2026Malware / Artificial Intelligence Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that…