# Today's Top Stories

February 21, 2026

  1. 1
    0
    SecurityWeek general Feb 20
    FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025

    FBI reports 700 ATM jackpotting incidents in 2025 resulted in $20 million in losses, with 1,900 total incidents since 2020 using the decade-old Ploutus malware. Attackers physically compromise ATMs to force cash dispensing, representing a significant physical security threat to financial institutions.

  2. 2
    0
    SecurityWeek general Feb 20
    BeyondTrust Vulnerability Exploited in Ransomware Attacks

    CISA updated its Known Exploited Vulnerabilities catalog to warn that CVE-2026-1731 in BeyondTrust is being exploited in active ransomware attacks. This represents an escalation from initial vulnerability disclosure to confirmed weaponization by ransomware operators.

  3. 3
    0
    The Record threat-intel Feb 20
    Romanian hacker faces up to 7 years for breaching Oregon emergency management department

    Romanian hacker Catalin Dragomir pleaded guilty to breaching Oregon's emergency management department and faces up to 7 years in prison for obtaining information from a protected computer and aggravated identity theft. The case demonstrates continued targeting of critical government infrastructure.

  4. 4
    0
    The Hacker News general Feb 20
    Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case

    Ukrainian national Oleksandr Didenko received 5 years in prison for providing North Korean IT workers with stolen US citizen identities to infiltrate American companies. Didenko pleaded guilty in November 2025 to wire fraud conspiracy and aggravated identity theft in this sophisticated state-sponsored scheme.

  5. 5
    0
    The Hacker News general Feb 20
    Former Google Engineers Indicted Over Trade Secret Transfers to Iran

    Three individuals including former Google engineers Samaneh Ghandali and Soroor Ghandali were indicted for allegedly stealing trade secrets from Google and other tech firms and transferring them to unauthorized locations including Iran. The case involves husband Mohammadjavad Khosravi in what appears to be state-sponsored intellectual property theft.

  6. 6
    0
    The Hacker News general Feb 19
    PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

    ESET discovered PromptSpy, the first Android malware to abuse Google's Gemini AI during execution to maintain persistence after device reboots. The malware captures lockscreen data, blocks uninstallation, and takes screenshots while leveraging generative AI to analyze on-screen elements and ensure survival.

  7. 7
    0
    BleepingComputer general Feb 20
    Japanese tech giant Advantest hit by ransomware attack

    Japanese semiconductor testing giant Advantest Corporation disclosed a ransomware attack on its corporate network that may have compromised customer and employee data. The incident affects a critical supplier in the global chip manufacturing supply chain.

  8. 8
    0
    Dark Reading general Feb 20
    Attackers Use New Tool to Scan for React2Shell Exposure

    Threat actors are using a sophisticated toolkit to scan for React2Shell exposure and target high-value networks for exploitation. Researchers describe the unfortunately named tool as demonstrating high operational sophistication in its targeting approach.

  9. 9
    0
    CISA Alerts vulnerability Feb 20
    CISA Adds Two Known Exploited Vulnerabilities to Catalog

    CISA added two RoundCube Webmail vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2025-49113 (deserialization flaw) and CVE-2025-68461 (cross-site scripting). Federal agencies must patch these actively exploited vulnerabilities under Binding Operational Directive 22-01.

  10. 10
    0
    The Hacker News general Feb 18
    Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

    Critical vulnerability CVE-2026-2329 (CVSS 9.3) in Grandstream GXP1600 VoIP phones allows unauthenticated remote code execution via stack-based buffer overflow. The flaw enables attackers to seize complete control of affected business phone systems without authentication.