Browser Security: Apple Zero-Days, Chrome 145, AI Attack Trends & Interop 2026

This newsletter is AI generated and may hallucinate sometimes 😊

Adblock Filters Exposes Reveal User Location Despite VPN Protection

  • New fingerprinting bypasses VPNs, exposing user location via AdBlock filter lists.
  • Malicious websites exploit country-specific AdBlock filter lists to pinpoint user location.
  • Browser configurations leveraged by malicious sites bypass VPNs by probing unique regional elements.

Source: teamwin.in | Date: February 12, 2026

VK Styles: 500K Users Infected by Chrome Extensions That Hijack VKontakte Accounts

  • Over 500,000 VKontakte users infected by five malicious Chrome extensions.
  • Malware delivered dynamic payloads via VK profile metadata and GitHub.
  • Threat enables CSRF token manipulation, forced group subscriptions, and persistent account control.

Source: koi.ai | Date: February 12, 2026

Google Reports State-Backed Hackers Using Gemini AI for Reconnaissance and Attack Support

  • Google's Threat Analysis Group (TAG) observed state-backed actors leveraging AI, specifically Gemini, for reconnaissance and attack support, enhancing their operational capabilities.
  • The use of AI includes drafting phishing emails, generating social engineering content, and assisting with OSINT activities to identify targets and vulnerabilities.
  • Attackers are employing AI to accelerate the research phase of campaigns, allowing for more tailored and sophisticated phishing, credential theft, and exploitation attempts.

Source: The Hacker News | Date: February 12, 2026

AI Prompt Injection Leading to RCE and Claude 0-Click Vulnerabilities Highlighted

  • A critical bulletin highlighted the emergence of AI prompt injection vulnerabilities that could lead to remote code execution (RCE) via manipulated input to Large Language Models.
  • The report also detailed a "0-Click" exploit affecting Claude AI, indicating a severe vulnerability that could compromise user data without direct user interaction.
  • These AI-specific attack vectors underscore evolving threats against browser-integrated AI features and web applications leveraging LLMs.

Source: The Hacker News | Date: February 12, 2026

Apple Patches Two Actively Exploited Zero-Day Vulnerabilities in iOS and macOS

  • Apple released emergency security updates for iOS, iPadOS, macOS, and watchOS to address two actively exploited zero-day vulnerabilities, CVE-2026-20700 (Kernel) and CVE-2026-20707 (WebKit).
  • The WebKit bug (CVE-2026-20707) is a use-after-free vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content.
  • Users are urged to update their devices to iOS 19.3.1, iPadOS 19.3.1, macOS Sonoma 14.3.1, and watchOS 10.3.1 immediately to mitigate the risk of targeted attacks.

Source: The Cyberthrone | Date: February 12, 2026

Major Browser Vendors Launch Interop 2026 to Enhance Web Compatibility

  • Mozilla, Microsoft, Google, and Apple have launched Interop 2026, a collaborative effort to improve web compatibility and developer experience across major browsers.
  • This year's initiative focuses on addressing key areas of inconsistency and pain points for web developers, building on the successes of previous Interop efforts.
  • Microsoft Edge's team has committed to significant contributions to Interop 2026, aiming to resolve over 50 specific focus areas and ensure better alignment with web standards.

Source: Mozilla Hacks Blog | Date: February 12, 2026

Chrome 145 Security Update Fixes Three High-Severity CSS and Codec Vulnerabilities

  • Google released Chrome version 145, addressing three high-severity vulnerabilities, including flaws in its CSS and Codec components.
  • These security flaws, identified as use-after-free vulnerabilities, could lead to remote code execution or denial-of-service if exploited.
  • Users are advised to update to Chrome 145.0.XXXX.XXX or later across all platforms to patch these critical issues and enhance browsing security.

Source: SecurityOnline.info | Date: February 12, 2026

References

  1. Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support - The Hacker News
  2. ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories - The Hacker News
  3. Apple Patch Tuesday – February 2026 - The Cyberthrone
  4. Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700) - Help Net Security
  5. Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Other Devices - The Hacker News
  6. Apple Zero-Day (CVE-2026-20700) Exploited in the Wild - SecurityOnline.info
  7. Apple fixed first actively exploited zero-day in 2026 - SecurityAffairs
  8. Launching Interop 2026 - Mozilla Hacks Blog
  9. Microsoft Edge and Interop 2026 - Microsoft Edge Dev Blog
  10. Chrome 145 Patches 3 High-Severity Flaws in CSS & Codecs - SecurityOnline.info
  11. Chrome Security Update – Patch for Vulnerabilities that Enables Code Execution Attacks - CybersecurityNews.com

Read more