Tageszusammenfassung - 18.02.2026

End-of-Day report

Timeframe: Dienstag 17-02-2026 18:00 - Mittwoch 18-02-2026 18:00 Handler: Guenes Holler Co-Handler: Michael Schlagenhaufer

News

Data breach at fintech firm Figure affects nearly 1 million accounts

Hackers have stolen the personal and contact information of nearly 1 million accounts after breaching the systems of Figure Technology Solutions, a self-described blockchain-native financial technology company.

https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/

Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages

Microsoft says an Exchange Online issue that mistakenly quarantined legitimate emails last week was triggered by faulty heuristic detection rules designed to block credential phishing campaigns.

https://www.bleepingcomputer.com/news/microsoft/microsoft-anti-phishing-rules-mistakenly-blocked-emails-teams-messages/

"Keine alltägliche Dimension": AWS kann DDoS-Attacke auf die Bahn nicht abfangen

Einen Tag lang ist es Hackern gelungen, den DB Navigator und bahn.de lahmzulegen. Die geschäftskritischen Systeme liegen bei Amazon Web Services.

https://www.golem.de/news/die-groessere-kante-aws-kann-ddos-attacke-auf-die-bahn-nicht-abfangen-2602-205569.html

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection.

https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html

Your AI-generated password isnt random, it just looks that way

Seemingly complex strings are actually highly predictable, crackable within hours Generative AI tools are surprisingly poor at suggesting strong passwords, experts say.

https://www.theregister.com/2026/02/18/generating_passwords_with_llms/

Red Vulns Rising: Examining Chinese National Vulnerability Databases

Learn how the Chinese vulnerability databases (CNVD and CNNVD) compare to CVE, including early disclosures, policy shifts, and data quality differences.

https://www.bitsight.com/blog/chinese-vulnerability-database-analysis-cnvd-cnnvd

Vulnerabilities

Flaws in popular VSCode extensions expose developers to attacks

Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local files and execute code remotely.

https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest.

https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html

Microsoft warnt vor kritischer Rechteausweitungslücke in Windows Admin Center

Im Windows Admin Center können Angreifer ihre Rechte ausweiten. Microsoft stuft das als kritisch ein und rät Admins zum Aktualisieren.

https://www.heise.de/news/Microsoft-warnt-vor-kritischer-Rechteausweitungsluecke-in-Windows-Admin-Center-11180525.html

From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day

Mandiant and Google Threat Intelligence Group (GTIG) have identified the zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769, with a CVSSv3.0 score of 10.0.

https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day/

Multiple Security-Updates for Splunk DB Connect - February 2026

https://advisory.splunk.com

[R2] Stand-alone Security Patches Available for Tenable Security Center versions 6.5.1, 6.6.0 and 6.7.2: SC-202602.1 + SC-202602.2

https://www.tenable.com/security/tns-2026-06

LWN Security updates for Wednesday

https://lwn.net/Articles/1059333/