The Breach News

Android Malware Exploits Google Gemini During Runtime

Cybercrime, Endpoint Security, Fraud Management & Cybercrime Experts Reveal PromptSpy Leverages AI for Enhanced Device Persistence Pooja Tikekar (@PoojaTikekar) • February 20, 2026 Image: Shutterstock Recent investigations have unearthed a novel strain of Android malware known as PromptSpy, which harnesses Google’s Gemini generative artificial intelligence model to automate its persistence…

Read MoreAndroid Malware Exploits Google Gemini During Runtime

Flagstar Customers Move Forward in $31.5M Data Breach Settlement

Preliminary Settlement Reached in Flagstar Bank Data Breach Lawsuits On February 20, 2026, a federal judge in Michigan granted preliminary approval for a significant settlement involving Flagstar Bank that totals $31.5 million. This settlement aims to address consolidated class-action claims stemming from two major data breaches that compromised the personal…

Read MoreFlagstar Customers Move Forward in $31.5M Data Breach Settlement

Critical Security Vulnerability Discovered in “jsonwebtoken” Library Utilized by Over 22,000 Projects

High-Severity Flaw in jsonwebtoken Library Poses Remote Code Execution Risk A significant security vulnerability has been discovered in the widely used open-source jsonwebtoken (JWT) library, which could allow attackers to execute arbitrary code on servers processing maliciously crafted JSON web token requests. This issue has been tracked as CVE-2022-23529 and…

Read MoreCritical Security Vulnerability Discovered in “jsonwebtoken” Library Utilized by Over 22,000 Projects

How Opening a Malicious PowerPoint File Can Compromise Your PC

In recent developments within the cybersecurity landscape, a noteworthy malware campaign has emerged, capitalizing on a previously reported vulnerability in Microsoft Office. This particular flaw, identified as CVE-2017-0199, relates to the Windows Object Linking and Embedding (OLE) interface. Although Microsoft issued a patch addressing this vulnerability earlier this year, threat…

Read MoreHow Opening a Malicious PowerPoint File Can Compromise Your PC

DHS Seeks Unified Search Engine to Identify Faces and Fingerprints Across Agencies

Department of Homeland Security Consolidates Biometric Technologies Amid Concerns Over Privacy and Data Security The Department of Homeland Security (DHS) is taking significant steps to streamline its biometric technologies by consolidating various systems into a single platform designed to compare faces, fingerprints, iris scans, and other identity metrics. This initiative…

Read MoreDHS Seeks Unified Search Engine to Identify Faces and Fingerprints Across Agencies

Energy Department Networks Targeted in Significant Cyber Attack

In a significant cyber incident reported two weeks ago, the computer networks of the Energy Department were compromised by unidentified hackers, leading to the breach of personal information belonging to several hundred employees. The extent of this breach raises serious concerns regarding the security of sensitive data within governmental agencies.…

Read MoreEnergy Department Networks Targeted in Significant Cyber Attack

Alert: Two Menacing Ransomware Strains Have Resurfaced – Safeguard Your Devices!

Ransomware continues to pose a significant threat to both individuals and corporations across the globe, increasingly becoming an impediment for various sectors including finance, healthcare, and manufacturing. Cyber criminals exploit vulnerabilities to siphon millions from their victims, making this a pressing issue for any business owner. In recent months, several…

Read MoreAlert: Two Menacing Ransomware Strains Have Resurfaced – Safeguard Your Devices!