AI generates vast amounts of code daily, but verification is becoming a critical bottleneck due to increased vulnerabilities and technical debt. Organisations must adopt layered governance to ensure safe and reliable software at scale.
Discover more at https://smarterarticles.co.uk/the-verification-crisis-why-checking-generated-code-is-harder-than-writing-it?pk_campaign=rss-feed
#HumanInTheLoop #AIinSoftware #CodeSecurity #SoftwareGovernance
The Verification Crisis: Why Checking Generated Code Is Harder Than Writing It

Software is eating the world, and now artificial intelligence is eating software. Cursor alone produces nearly one billion lines of acc...

SmarterArticles
Exploring Security Vulnerabilities In A Cheapo WiFi Extender

If all you want is just a basic WiFi extender that gets some level of network connectivity to remote parts of your domicile, then it might be tempting to get some of those $5, 300 Mbit extenders ofโ€ฆ

Hackaday

It's been a busy 24 hours in the cyber world with significant updates on AI-assisted attacks, actively exploited vulnerabilities, a data exposure incident, new spyware techniques, and a look at AI for defence. Let's dive in:

AI-Augmented FortiGate Breaches ๐Ÿค–๐Ÿ“ฐ

- A Russian-speaking, financially motivated threat actor used commercial generative AI services to breach over 600 FortiGate firewalls across 55 countries between January and February 2026.
- The attacks exploited exposed management interfaces and weak credentials lacking multi-factor authentication, rather than zero-day vulnerabilities, demonstrating how AI lowers the barrier to entry for less skilled actors.
- AI was used to generate attack methodologies, develop custom reconnaissance tools (in Python and Go), plan lateral movement, and draft operational documentation, leading to the extraction of sensitive configurations, Active Directory compromise, and targeting of backup infrastructure, likely for ransomware deployment.

๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/
๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/02/ai-assisted-threat-actor-compromises.html

Actively Exploited Vulnerabilities: React2Shell & Roundcube ๐Ÿ•ถ๏ธ๐Ÿ“ฐ

- React2Shell (CVE-2025-55182): This critical RCE (CVSS 10.0) in React Server Components is still being actively exploited, with a new "ILovePoop" toolkit used by a possibly state-sponsored actor for reconnaissance against government, defence, finance, and industrial targets globally. Patching is complex due to Next.js bundling React as a 'vendored' package, making it invisible to standard dependency scanners.
- Roundcube Webmail Flaws: CISA has added two actively exploited vulnerabilities to its KEV catalog: CVE-2025-49113 (RCE, CVSS 9.9) and CVE-2025-68461 (XSS, CVSS 7.2). The RCE flaw, a deserialization issue present for over 10 years, was weaponised within 48 hours of public disclosure, with nation-state actors previously targeting Roundcube.
- Organisations should prioritise patching these vulnerabilities, especially React2Shell, which affects default configurations and has seen sophisticated post-exploitation tradecraft, and Roundcube, with a CISA deadline for FCEB agencies by March 13, 2026.

๐Ÿ•ถ๏ธ Dark Reading | https://www.darkreading.com/application-security/attackers-new-tool-scan-react2shell-exposure
๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/02/cisa-adds-two-known-exploited-vulnerabilities-catalog

PayPal Code Error Exposes PII ๐Ÿ•ต๐Ÿผ

- PayPal notified approximately 100 customers of a data exposure incident due to a coding error in its Working Capital loan application, which inadvertently leaked personal information including names, Social Security numbers, dates of birth, email addresses, and business addresses.
- The exposure occurred between July 1, 2025, and December 13, 2025, with a "few" customers also experiencing unauthorised transactions, all of which have been fully refunded by PayPal.
- The company has rolled back the problematic code change, reset affected account passwords, and is offering two years of free credit monitoring to impacted individuals.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/20/paypal_app_code_error_leak/

Predator Spyware's iOS Stealth Techniques ๐Ÿค–

- Intellexa's Predator spyware can effectively hide iOS camera and microphone recording indicators (the green/orange dots) from users, allowing it to secretly stream audio and video feeds to operators.
- The malware achieves this by leveraging kernel-level access to hook a single function, โ€˜HiddenDot::setupHook()โ€™, within SpringBoard, which intercepts and nullifies sensor activity updates before they reach the UI layer.
- This sophisticated technique prevents the operating system from displaying any visual cues of active surveillance, making the spyware's activity completely hidden to a regular user, although technical analysis can still reveal malicious processes.

๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity/

Anthropic Launches AI for Code Security ๐Ÿ“ฐ

- Anthropic has introduced "Claude Code Security," a new feature for its Enterprise and Team customers that uses AI to scan software codebases for vulnerabilities and suggest targeted patches.
- This initiative aims to counter the growing threat of adversaries weaponising AI for automated vulnerability discovery by providing defenders with an AI-powered tool that can reason about code like a human security researcher, tracing data flows and identifying issues missed by traditional static analysis.
- The system includes a multi-stage verification process to filter false positives, assigns severity ratings, and operates with a human-in-the-loop approach, ensuring that no patches are applied without developer review and approval.

๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/02/anthropic-launches-claude-code-security.html

#CyberSecurity #ThreatIntelligence #AI #FortiGate #Vulnerabilities #RCE #Roundcube #React2Shell #Spyware #Predator #iOS #DataBreach #PayPal #CodeSecurity #InfoSec #CyberAttack #IncidentResponse

Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks

Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks.

BleepingComputer

Wes Roth (@WesRoth)

GeminiํŒ€์ด GeminiCLI ๊ธฐ๋ฐ˜์˜ ์˜คํ”ˆ์†Œ์Šค AI ์ฝ”๋“œ ๋ณด์•ˆ ์—์ด์ „ํŠธ๋ฅผ ๋ฐฐํฌํ–ˆ๋‹ค๊ณ  ๋ณด๊ณ ํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด ์—์ด์ „ํŠธ๋Š” Openclaw ํ”„๋กœ์ ํŠธ์˜ ์น˜๋ช…์  ์ทจ์•ฝ์ ์„ ์ž๋™์œผ๋กœ ํƒ์ง€ํ•˜๊ณ , ๊ฐœ๋… ์ฆ๋ช…(POC)์„ ์ƒ์„ฑํ•˜๋ฉฐ, ์ง์ ‘ ํ’€ ๋ฆฌํ€˜์ŠคํŠธ๊นŒ์ง€ ์—ด์–ด ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•œ ์‚ฌ๋ก€๋ฅผ ๊ณต์œ ํ–ˆ์Šต๋‹ˆ๋‹ค. ์ž๋™ํ™”๋œ ์ฝ”๋“œ ๋ณด์•ˆ/์ˆ˜์ • ์›Œํฌํ”Œ๋กœ์šฐ์˜ ์‹ค์‚ฌ์šฉ ์‚ฌ๋ก€์ž…๋‹ˆ๋‹ค.

https://x.com/WesRoth/status/2018255572857237695

#gemini #aisecurity #opensource #codesecurity

Wes Roth (@WesRoth) on X

The Gemini team has deployed an open-source AI code security agent powered by GeminiCLI that automatically detected and resolved a critical vulnerability in the Openclaw project. The agent not only spotted the issue but generated a proof of concept, opened a pull request, and

X (formerly Twitter)

Be like Bettina Dutler start signing your Git commits with SSH today!

At SmartGit we documented how easy this is with GitHub and GitLab!

#Git #SSH #DevOps #SmartGit #CodeSecurity#SoftwareEngineering

๐Ÿ‘พ Behold, the breathtaking breakthrough of rendering #graphics at the speed of a caffeinated snail using the legendary micro-teeny-tinygrad! ๐ŸŽจโœจ Apparently, #GitHub has decided we need yet another #AI tool to clutter our already overflowing virtual garages. Who knew code security could be so... miniscule? ๐Ÿ”๐Ÿ”’
https://github.com/quantbagel/gtinygrad #Tools #MicroTinygrad #CodeSecurity #HackerNews #ngated
GitHub - quantbagel/gtinygrad: You like pytorch? You like micrograd? You love tinygrad! โค๏ธ

You like pytorch? You like micrograd? You love tinygrad! โค๏ธ - GitHub - quantbagel/gtinygrad: You like pytorch? You like micrograd? You love tinygrad! โค๏ธ

GitHub
๐ŸŽ‰ Ah, the KIM-1 turns 50, and what better way to celebrate than a GitHub demo no one asked for, buried under a pile of buzzword salad? ๐Ÿค– Just remember, folks: nothing screams "party" like platform #AI and code security lingo. ๐ŸŽ‚
https://github.com/netzherpes/KIM1-Demo #KIM1 #50thAnniversary #GitHubDemo #BuzzwordSalad #CodeSecurity #HackerNews #ngated
GitHub - netzherpes/KIM1-Demo: a little demo for the KIM-1 for it's 50th birthday

a little demo for the KIM-1 for it's 50th birthday - netzherpes/KIM1-Demo

GitHub

โ€œNoise reduction alone isnโ€™t the goal; accuracy on real risks is.โ€
โ€” James Wickett, CEO & Co-founder, DryRun Security

Why application security needs context at code review - and why intent matters more than alert volume.

Read more:
https://www.technadu.com/why-application-security-needs-context-at-code-review-not-more-alerts/616254/

#AppSec #DevSecOps #CodeSecurity #InfoSec