Good morning. This is your security briefing for Monday, February 16, 2026, covering 6 articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.
According to reports from Rekt News, Boring Security, and researcher Seongsu Park, North Korean and Chinese nation-state actors are conducting sophisticated infiltration campaigns targeting Western technology companies and IT professionals. The operations include using stolen identities to secure legitimate remote employment at over 300 U.S. companies where attackers exfiltrate code and sensitive data for months undetected, as well as the Contagious Interview campaign that uses fake job interviews to deliver BeaverTail and InvisibleFerret malware through malicious Visual Studio Code workspaces and NPM packages. These attacks specifically target cryptocurrency and Web3 professionals, deploying trojanized MetaMask extensions to steal wallet credentials, seed phrases, and private keys while exploiting economic anxieties in the job market.
The Canadian Centre for Cyber Security reports on emerging cyber threats targeting the marine transportation sector from multiple threat actor types including state-sponsored groups, financially motivated cybercriminals, and non-state actors. The sector's increasing digitalization has significantly expanded attack surfaces, creating substantial risks to Canada's economic and national security through various attack methods targeting shipping, ports, and logistics infrastructure.
Intego Security researchers have identified the Matryoshka variant of ClickFix, a social engineering campaign targeting macOS users through typosquatted domains that mimic software review sites. The attack uses a Traffic Distribution System to redirect victims to fake pages that instruct them to execute Terminal commands, downloading an encoded stealer payload that employs advanced evasion techniques including in-memory decoding and decompression to exfiltrate sensitive data while displaying fake error messages.
Researchers from ETH Zurich have discovered significant security vulnerabilities in three popular cloud-based password managers, Bitwarden, LastPass, and Dashlane, affecting approximately 60 million users. The vulnerabilities allow attackers to view and modify stored passwords through simple user interactions like logging in or syncing data, with researchers demonstrating 12 attacks on Bitwarden, 7 on LastPass, and 6 on Dashlane, challenging these providers' claims of absolute security through zero-knowledge encryption.
That concludes today's briefing.