CyberSecurity Knuggets
Feb 20, 2026
Here are the summaries for the first 5 emails based on the provided text:
Email 1: Srsly Risky Biz: Europe’s Cyber Bullets Can’t Replace Political Wills
By Tom Uren, 19 Feb 2026
This newsletter discusses Europe’s growing calls for offensive cyber capabilities to counter Russian aggression, including sabotage campaigns targeting European infrastructure. Despite the rhetoric, Europe has yet to take robust retaliatory cyber actions, possibly due to lacking political will, even though tools like sanctions and diplomatic expulsions are available. The article also highlights emerging cybersecurity issues around AI, focusing on “distillation attacks” where adversaries extract proprietary AI model logic. Google and OpenAI report such attacks, often linked to Chinese entities, and urge greater government support to protect US AI advantages. Finally, it notes positive developments in explicit image removal, cookie security, and device theft protection.
Email 2: Texas AG sues TP-Link, saying it allowed the CCP to hack routers
By Cynthia B Brumfield, 19 Feb 2026
Texas Attorney General Ken Paxton has filed a lawsuit against TP-Link alleging it allowed Chinese Communist Party (CCP)-affiliated hackers to compromise consumer routers under false claims of security. This follows prior suits against other Chinese firms accused of surveillance. A May 2023 Check Point report linked TP-Link vulnerabilities to the Camaro Dragon hacking group attributed to China. The report notes TP-Link components are partly manufactured in China, subjecting them to intelligence-sharing laws. The email also covers a French national bank data breach affecting 1.2 million accounts, a Microsoft 365 Copilot AI bug leaking confidential emails, DEF CON banning individuals linked to Jeffrey Epstein, a cyberattack disrupting Germany’s Deutsche Bahn rail services, Polish army banning Chinese cars from secure facilities, Iranian-aligned malware campaigns against protesters, a data breach at blockchain lender Figure, and sentences for darknet drug traffickers.
Email 3: Identity security for an AI-first world
This email offers an invitation to watch an on-demand webinar by 1Password titled “A New Framework for Identity Security.” It focuses on identity security challenges in 2026 amid expanding AI adoption across applications and devices. Featuring experts from 1Password and the FranklinCovey CIO, the webinar discusses applying Zero Trust principles to modern identity sprawl to restore control and secure organizational environments. Additional related resources and blog posts are included for further learning.
Email 4: New phishing toolkit proxies live websites | The CyberWire 2.19.26s
This briefing covers several cybersecurity news highlights for Feb 19, 2026:
– A new phishing framework called “Starkiller” uses live proxying of genuine websites to bypass detection and enhance attacks, enabling low-skilled attackers to perform session hijacking and MFA bypass.
– Blockchain lender Figure confirms a data breach impacting nearly one million user records due to a social engineering attack; the ShinyHunters claimed responsibility.
– German rail operator Deutsche Bahn experienced large-scale DDoS attacks disrupting ticketing and digital services.
– A California man was sentenced to almost five years for darknet drug trafficking.
The email also includes sponsored content promoting cybersecurity products and upcoming events like RSAC 2026.
Email 5: German Rail Giant Hit by Cyberattacks
This newsletter highlights a significant Distributed Denial of Service (DDoS) attack against Deutsche Bahn, Germany’s national rail operator, causing disruptions to booking and operational services. It also touches on ongoing security vulnerabilities, such as Ivanti zero-day exploits dating back to mid-2025, new funding rounds for AI-driven cybersecurity startups, and the exposure of nearly one million user records in a breach at Figure. Other notable news includes French government disclosure of a bank account data breach affecting 1.2 million accounts, concerns over password manager vulnerabilities, and a range of cybersecurity insights, including efforts to secure industrial control systems.
Let me know if you need detailed extracts or summaries for additional emails!
Stay Well!
