BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Vulnerability Intelligence: AI Exploit Acceleration, Android Banking Trojans, and Mass CVE Disclosures

Vulnerability Intelligence: AI Exploit Acceleration, Android Banking Trojans, and Mass CVE Disclosures

February 19, 2026Vulnerabilities & Exploits3 min readhigh

Originally reported by The Hacker News, Qualys, SANS ISC, MSRC Security Updates

#vulnerability-disclosure#android-malware#ai-exploitation#chromium-cves#linux-kernel#patch-management
Share

TL;DR

AI tools collapse exploitation windows, new Android banking trojans target IPTV users, Iran protest surveillance campaigns emerge, while Microsoft publishes 100+ CVE disclosures spanning Chrome,...

Why high?

Multiple active malware campaigns targeting banking users combined with AI-accelerated exploitation capabilities and numerous high-severity CVEs create significant immediate threat exposure requiring urgent attention.

AI-Powered Exploitation Collapses Response Windows

Security researchers highlight a fundamental shift in the threat landscape as AI-powered tools accelerate the exploitation timeline from disclosure to active attacks. The analysis suggests that traditional "technical debt" approaches to security configuration, where developers deploy overly permissive cloud workloads or generate temporary API keys with the intention of fixing them later, are no longer viable in 2026.

The research emphasizes that what were once considered minor operational risks that could be addressed during slower development cycles now represent critical exposure windows that can be exploited within minutes by AI-enhanced attack tools.

Massiv Android Banking Trojan Targets IPTV Users

ThreatFabric disclosed details of a new Android trojan called "Massiv" designed for device takeover (DTO) attacks targeting financial theft. The malware masquerades as legitimate IPTV applications to deceive users seeking online TV streaming services.

The campaign specifically targets mobile banking users by exploiting the popularity of IPTV applications, indicating threat actors are leveraging users' desire for streaming content as an attack vector for financial fraud.

CRESCENTHARVEST Espionage Campaign Targets Iran Protesters

The Acronis Threat Research Unit identified a new espionage campaign dubbed CRESCENTHARVEST, actively targeting supporters of Iran's ongoing protests since January 9, 2026. The campaign deploys remote access trojan (RAT) malware designed for long-term information theft and surveillance operations.

This represents a continuation of state-sponsored or state-aligned cyber operations targeting political dissidents and protest movements, utilizing malware for intelligence gathering and persistent access to victim systems.

Qualys Introduces AI-Powered Patch Reliability Scoring

Qualys announced a new AI-powered patch reliability scoring system designed to predict patch impact before deployment. The system addresses the critical issue of patch rollbacks, which create security gaps and operational disruption.

According to Qualys telemetry from 2025, advisories like USN-7545-1 and Windows updates KB5065426, KB5063878, KB5055523, and KB5066835 were among the most frequently rolled-back patches, highlighting the need for better patch impact prediction.

Mass Chromium CVE Disclosures

Microsoft published multiple Chromium-related CVE disclosures affecting Microsoft Edge, including:

  • CVE-2026-2319: Race condition in DevTools
  • CVE-2026-2316: Insufficient policy enforcement in Frames
  • CVE-2026-2314: Heap buffer overflow in Codecs

These vulnerabilities are addressed through Chromium updates that Microsoft Edge inherits, following the standard Chromium security update process.

Extensive Linux Kernel and Library Vulnerabilities

Microsoft disclosed numerous Linux kernel CVEs spanning multiple subsystems:

Network Stack Issues:

  • CVE-2025-40149: TLS stack vulnerability in get_netdev_for_sock()
  • CVE-2025-40135: IPv6 RCU usage issue in ip6_xmit()
  • CVE-2025-40170: Network device RCU handling in sk_setup_caps()

File System Vulnerabilities:

  • CVE-2025-68772: F2FS compression context update during writeback
  • CVE-2025-68767: HFS+ inode mode verification during disk loading
  • CVE-2025-68803: NFSv4 file creation ACL setting oversight

Memory Management:

  • CVE-2025-68822: Use-after-free in ALPS input driver
  • CVE-2025-68801: Neighbor use-after-free in mlxsw spectrum router
  • CVE-2025-71075: Use-after-free in aic94xx SCSI driver device removal

Library and Application Vulnerabilities

Critical Library Issues:

  • CVE-2025-24855: Use-after-free in libxslt XPath evaluations
  • CVE-2026-22801: Integer truncation causing heap buffer over-read in libpng
  • CVE-2025-12818: PostgreSQL libpq allocation undersizing via integer wraparound
  • CVE-2026-0861: Integer overflow in memalign leading to heap corruption

Network Protocol Vulnerabilities:

  • CVE-2025-15224: libssh key passphrase bypass without agent configuration
  • CVE-2025-15079: libssh global known_hosts override vulnerability
  • CVE-2025-14524: Bearer token leak on cross-protocol redirects

Container and Virtualization:

  • CVE-2024-40635: containerd integer overflow in User ID handling
  • CVE-2025-12748: Libvirt denial of service in XML parsing

Sources

  • https://thehackernews.com/2026/02/from-exposure-to-exploitation-how-ai.html
  • https://thehackernews.com/2026/02/fake-iptv-apps-spread-massiv-android.html
  • https://thehackernews.com/2026/02/crescentharvest-campaign-targets-iran.html
  • https://blog.qualys.com/product-tech/2026/02/18/new-ai-powered-patch-reliability-scoring-predict-patch-impact-before-you-deploy
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2319
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2316
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2314

Originally reported by The Hacker News, Qualys, SANS ISC, MSRC Security Updates

Tags

#vulnerability-disclosure#android-malware#ai-exploitation#chromium-cves#linux-kernel#patch-management

Related Intelligence

  • Active Android Exploit, Government-Targeted Campaigns, and OAuth Abuse Highlight March Threat Landscape

    highMar 3, 2026
  • Weekly Vulnerability Roundup: OpenClaw AI Agent Hijacking, Vim Command Injection, and Vitess Path Traversal

    highMar 1, 2026
  • Critical Zero-Days Hit Chrome, Linux AppArmor Flaws Enable Root Escalation, Veeam RCE Vulnerabilities Patched

    criticalMar 13, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← WIRED Compiles Digital Security Guide for Activists and Organizers Under Surveillance

Next Article

Malware Roundup: 651 Cybercriminals Arrested, New Android Banking Trojan, Critical CCTV Flaw →